Designing a distributed fault tolerance algorithm requires careful analysis of both fault models and diagnosis strategies. A system will fail if there are too many active faults, ...
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
— In this paper we study the problem of dynamic optimization of ping schedule in an active sonar buoy network deployed to provide persistent surveillance of a littoral area throu...
— This paper deals with the performance modeling of the various MAC states as defined by the cdma2000 protocol. Our method uses a composite performance metric which has the capa...
In last decade intelligent transportation systems (ITS) and vehicular ad hoc network (VANET) became one of the most active and emerging fields of research. It is expected that thi...
Une Thoing Rosi, Chowdhury Sayeed Hyder, Tai-hoon ...