Abstract-- We consider problems where multiple agents cooperate to control their individual state so as to optimize a common objective while communicating with each other to exchan...
Any packet destined to a honeypot machine (that is, a decoy server machine) is most probably an attack packet. We propose honeypot back-propagation, a scheme that traces attack pa...
Sherif M. Khattab, Rami G. Melhem, Daniel Moss&eac...
Abstract—Routing with service restorability is of much importance in Multi-Protocol Label Switched (MPLS) networks, and is a necessity in optical networks. For restoration, each ...
— We investigate spectrum sensing by energy detection based on two different objective functions: a Bayesian sensing cost or the network weighted sum capacity. The Bayesian cost ...
Peng Jia, Mai Vu, Tho Le-Ngoc, Seung-Chul Hong, Va...
We consider the problem of designing distributed mechanisms for joint congestion control and resource allocation in spatial-reuse TDMA wireless networks. The design problem is pos...