Abstract. We propose a framework for managing resources via convergent operators. Operators represent their need for a resource to a designated resource closure operator that manag...
Abstract— In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDIS), that aims at dealing with large scale network attacks feat...
Marek Ostaszewski, Pascal Bouvry, Franciszek Sered...
- This paper analyzes the energy efficiency of wireless sensor networks using different error control schemes. An analytical model is presented to evaluate the energy efficiency in...
Abstract— An adaptive handover algorithm for wireless comn systems is addressed in this extended abstract. Moving from the Generalized Extended Least Square handover algorithm in...
Claudia Rinaldi, Fortunato Santucci, Carlo Fischio...
This paper proposes a context-dependent case-based mechanism for selecting negotiation partners with the focus on the adaptation of similarity relations to a specific context. Th...