This paper argues about the deployment positions of Network-based Intrusion Detection System and suggests the "Distributed Network Security Sensors" distributed among the...
—Mobile video broadcasting service, or mobile TV, is a promising application for 3G wireless network operators. Most existing solutions for video broadcast/multicast services in ...
Sha Hua, Yang Guo, Yong Liu, Hang Liu, Shivendra S...
Mobile video broadcasting service, or mobile TV, is expected to become a popular application for 3G wireless network operators. Most existing solutions for video Broadcast Multica...
Sha Hua, Yang Guo, Yong Liu, Hang Liu, Shivendra S...
— Hybrid Medium Access Control (MAC) protocols combine the strength of random and schedule based MAC schemes. From random MAC schemes, Hybrid MAC protocols borrow flexibility an...
Yuvraj. K. Rana, Bao Hua Liu, Alfandika Nyandoro, ...
This paper presents an evolutionary algorithm to develop cooperative strategies for power buyers in a deregulated electrical power market. Cooperative strategies are evolved throu...