Network security is a complex and challenging problem. The area of network defense mechanism design is receiving immense attention from the research community for more than two de...
Sankardas Roy, Charles Ellis, Sajjan Shiva, Dipank...
This work presents a comprehensive theoretical framework for window-based congestion control protocols that are designed to converge to fairness and efficiency. We first derive ...
This work outlines two approaches for small unmanned aerial vehicles (UAVs) performing surveillance with fixed cameras. Small UAVs present significant control challenges, due to re...
Stephen Jackson, John Tisdale, Maryam Kamgarpour, ...
This paper presents Bounded Ideation Theory (BIT) to explain the relationship between the number-of-ideas and the number-of-good-ideas contributed during ideation. BIT posits that...
re more abstract than necessary. They depend on assumptions that are highly unlikely to occur in practical situations, which are often less formal and rigid. Nonetheless, we discus...