Abstract—Symbol synchronization in traditional hardwaredriven communication systems has relied on the transmission of training sequences of symbols just before the beginning of t...
Raja Jurdak, Antonio G. Ruzzelli, Gregory M. P. O'...
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
Signature matching, which includes packet classification and content matching, is the most expensive operation of a signature-based network intrusion detection system (NIDS). In t...
An accurate and up-to-date diagnostic model is critical for economic aircraft engine operation. However, for many commercial airline fleets, monitoring and diagnosing engine fault...
LiJie Yu, Daniel J. Cleary, Mark D. Osborn, Vrinda...
Background: Cancer diagnosis and clinical outcome prediction are among the most important emerging applications of gene expression microarray technology with several molecular sig...
Alexander R. Statnikov, Lily Wang, Constantin F. A...