Network security is a complex and challenging problem. The area of network defense mechanism design is receiving immense attention from the research community for more than two de...
Sankardas Roy, Charles Ellis, Sajjan Shiva, Dipank...
Current computer involvement in adolescent social networks (youth between the ages of 11 and 17) provides new opportunities to study group dynamics, interactions amongst peers, an...
Juan Fernando Mancilla-Caceres, Wen Pu, Eyal Amir,...
—With the evolution of mobile devices and networks, and the growing trend of mobile Internet access, rich, multi-player gaming using mobile devices, similar to PC-based Internet ...
It is shown in this paper that direct extensions of distributed greedy Interference Avoidance (IA) techniques for networks with centralized receivers to networks with multiple unc...
Rekha Menon, Allen B. MacKenzie, R. Michael Buehre...
We review the applications of artificial life (ALife), the creation of synthetic life on computers to study, simulate, and understand living systems. The definition and features of...