In IEEE 802.11 based ad hoc networks, by simply manipulating the back-off timers and/or wait times prior to transmission, malicious nodes can cause a drastically reduced allocatio...
Venkata Nishanth Lolla, Lap Kong Law, Srikanth V. ...
—Event-related potentials (ERPs) recorded at the scalp are indicators of brain activity associated with eventrelated information processing; hence they may be suitable for the as...
Akaysha C. Tang, Matthew T. Sutherland, Christophe...
— In this work we discuss how the quality of localization knowledge impacts the remote operation of rovers on the surface of Mars. We look at the techniques of localization estim...
Mark W. Powell, Thomas Crockett, Jason Fox, Joseph...
In this paper we propose the use of Discrete Choice Analysis (DCA) for static facial expression classification. Facial expressions are described with expression descriptive units ...
Gianluca Antonini, Matteo Sorci, Michel Bierlaire,...
In an era of cooperating ad hoc networks and pervasive wireless connectivity, we are becoming more vulnerable to malicious attacks. Many of these attacks are silent in nature and ...