Malicious network traffic, including widespread worm activity, is a growing threat to Internet-connected networks and hosts. In this paper, we propose a network intrusion detectio...
This paper examines technique of media access that flexible media service, provided user interaction, and guaranteeing QoS. Currently, there are various streaming services, but th...
Sangok Kim, Kanghee Lee, Zhefan Jiang, Sangwook Ki...
Many lock-free data structures in the literature exploit techniques that are possible only because state-of-the-art 64-bit processors are still running 32-bit operating systems an...
Simon Doherty, Maurice Herlihy, Victor Luchangco, ...
In this paper, a two-dimensional airfoil shape optimisation problem is investigated using CFD within a grid computing environment (GCE) implemented in Matlab. The feature-based par...
Wenbin Song, Andy J. Keane, M. Hakki Eres, Graeme ...
As new mobile communication technologies are becoming broadly available, there is urgent pressure to populate them with services that provide returns for the huge investements mad...