We propose and investigate a game-theoretic approach to the malware filtering and detector placement problem which arises in network security. Our main objective is to develop opt...
Stephan Schmidt, Tansu Alpcan, Sahin Albayrak, Tam...
Despite the reliability of modern disks, recent studies have made it clear that a new class of faults, Undetected Disk Errors (UDEs) also known as silent data corruption events, b...
Eric Rozier, Wendy Belluomini, Veera Deenadhayalan...
Over the past ten years, many pricing schemes have been proposed for a QoS-enabled network. Most of the proposed QoS-pricing schemes focus on congestion-sensitive pricing and opti...
— This paper presents a promising architecture for of the 3GPP’s IMS for supporting real-time session negotiation converging third-generation (3G) cellular data networks and an...
This paper proposes the modeling and the performance analysis of a high-level control protocol – COCOP, which enables cooperative groups of clients to control a shared server de...