Resource and cost constraints remain a challenge for wireless sensor network security. In this paper, we propose a new approach to protect confidentiality against a parasitic adver...
In this paper, we study phase transition behavior emerging from the interactions among multiple agents in the presence of noise. We propose a simple discrete-time model in which a...
Wide-area service replication is becoming increasingly common, with the emergence of new operational models such as content delivery networks and computational grids. This paper d...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
The changes of structural and photoluminescence (PL) characteristics of MBE-grown CdZnSe/ZnSe single quantum well (QW) structures caused by Cd/Zn interdiffusion were studied by hi...
L. V. Borkovska, N. Korsunska, V. Kladko, M. Slobo...
—This paper demonstrates the use of a model-based evaluation approach for instrumentation systems (ISs). The overall objective of this study is to provide early feedback to tool ...
Abdul Waheed, Diane T. Rover, Jeffrey K. Hollingsw...