Tertiary institutions in South Africa are faced with dealing with diversity in all its forms in our classrooms. Information Systems, Information Technology and Computer Science st...
The open and anonymous nature of a P2P network makes it an ideal medium for attackers to spread malicious content. In this paper, we propose a reputation-based trust management sy...
Observing the workload on a computer system during a short (but not too short) time interval may lead to distributions that are significantly different from those that would be o...
—We consider the application of switch-and-stay transmit diversity (SSTD) to a three-node cooperative diversity system with decode-and-forward relaying. The basic idea of SSTD ge...