Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
We propose two novel algorithms based on compressed-sensing theory to estimate and cancel narrow band interference (NBI) in orthogonal frequency division multiplexing (OFDM) syste...
Ahmad Gomaa, K. M. Zahidul Islam, Naofal Al-Dhahir
The ROMIO implementation of the MPI-IO standard provides a portable infrastructure for use on top of any number of different underlying storage targets. These different targets va...
Robert B. Ross, Robert Latham, William Gropp, Raje...
The latest ITU-T standard syntax of Message Sequence Charts (MSCs) 16] o ers several operators to compose MSCs in a hierarchical, iterating, and nondeterministic way. However, curr...
Abstract. This paper proposes a decision support system for tactical air combat environment using a combination of unsupervised learning for clustering the data and an ensemble of ...