— In order to avoid the large peak transmit power, resulting from the high transmission rates expected for future mobile communication systems, a wireless multi-hop virtual cellu...
Lalla Soundous El Alami, Eisuke Kudoh, Fumiyuki Ad...
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
In this paper we present a methodical evaluation of the performance of a new and two traditional approaches to automatic target recognition (ATR) based on silhouette representatio...
Protocol reverse engineering has often been a manual process that is considered time-consuming, tedious and error-prone. To address this limitation, a number of solutions have rec...
—In the realm of satellite communications, one of the great impairments to increase the spectral efficiency is multi-user interference in the reverse link (mobile to satellite). ...