Large scale penetration of digital technologies led them to join roads, electricity, and water distribution, as essential infrastructures of modernity. “Digital convergence” r...
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
Abstract— It has been demonstrated that base station cooperation can reduce co-channel interference (CCI) and increase cellular system capacity. In this work we consider another ...
Yifan Liang, Andrea J. Goldsmith, Gerard J. Foschi...
— Determining the optimal topology of a graph is pertinent to many domains, as graphs can be used to model a variety of systems. Evolutionary algorithms constitute a popular opti...
A wide variety of interactions on the Internet are characterized by the availability of cheap pseudonyms, where users can obtain new identities freely or at a low cost. Due to the...