We address two issues which arise in the task of detecting anomalous behavior in complex systems with numerous sensor channels: how to adjust alarm thresholds dynamically, within ...
Richard J. Doyle, Suzanne M. Sellers, David Atkins...
In an era of cooperating ad hoc networks and pervasive wireless connectivity, we are becoming more vulnerable to malicious attacks. Many of these attacks are silent in nature and ...
We present an on-line crosslayer control technique to characterize and approximate optimal policies for wireless networks. Our approach combines network utility maximization and ad...
— Multiuser diversity refers to a type of diversity present across different users in a fading environment. This diversity can be exploited by scheduling transmissions so that us...
4G systems are expected to support data rates of the order of 100 Mbps in the outdoor environment and 1 Gbps in the indoor/stationary environment. In order to support such large p...
Mansoor Shafi, Min Zhang, Aris L. Moustakas, Peter...