Existing density-based data stream clustering algorithms use a two-phase scheme approach consisting of an online phase, in which raw data is processed to gather summary statistics...
Agostino Forestiero, Clara Pizzuti, Giandomenico S...
We present an empirical study of the resistance of several protocols to denial of service (DoS) attacks on client-server communication. We show that protocols that use authenticat...
Gal Badishi, Amir Herzberg, Idit Keidar, Oleg Roma...
—Wireless networking is currently dominated by radio frequency (RF) techniques. However, the soon-to-be ubiquity of LED-based lighting motivated by significant energy savings pro...
Thomas D. C. Little, Peter Dib, Kandarp Shah, Nick...
Identity management and federation is becoming an ever present problem in large multi-institutional environments. By their nature, Grids span multiple institutional administration...
Stephen Langella, Scott Oster, Shannon Hastings, F...
We consider schemes for enacting task share changes—a process called reweighting—on real-time multiprocessor platforms. Our particular focus is reweighting schemes that are de...