Rapid advances in research and technology now allow data analysis and modeling of extremely complex systems. Methods from artificial intelligence (AI) such as Neural Networks have...
— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
— We consider the control of impulsive systems with jumps triggered by a renewal process, that is, the intervals between jumps are independent and identically distributed. The co...
In this paper we address the real-time capabilities of P-NET, which is a multi-master fieldbus standard based on a virtual token passing scheme. We show how P-NET's medium ac...
Supporting mobility in Wireless ATM networks poses a number of technical issues. An important issue is the ability to reroute ongoing virtual connections during handoff as mobile ...