— A vast amount of broadcasting protocols has been developed for wireless ad hoc networks. To the best of our knowledge, however, these protocols assume a single-radio singlechan...
— Anomaly-based intrusion detection systems have the ability of detecting novel attacks, but in real-time detection, they face the challenges of producing many false alarms and f...
Distinguishing transient blocks from frequently used blocks enables servicing references to transient blocks from a small fully-associative auxiliary cache structure. By inserting...
Multimedia streaming applications can significantly boost the value of mobile ad hoc networks (MANET). Live streaming, however, means continuous data delivery, which is a major c...
This article presents the most distinguishing features of the Argentinian web as found in a private sample of almost 10 million web pages from 150.000 sites collected in the early...
Gabriel Tolosa, Fernando Bordignon, Ricardo A. Bae...