Networked games are newly emerging and increasing applications in the Internet community. Multiplayer Online Game (MOG) is one of such applications that can accommodate many users...
Traditional intrusion detection systems have a central coordinator with a static hierarchical architecture. We propose a peer-to-peer intrusion detection system that has no centra...
Abstract. Providing energy efficiency in MAC (Medium Access Control) layer, while achieving desirable throughput, is an important research issue in the area of wireless networking....
Phylogenetic trees are built by examining differences in the biological traits of a set of species. An example of such a trait is a biological network such as a metabolic pathway,...
Constraint automata have been introduced to provide a compositional, operational semantics for the exogenous coordination language Reo, but they can also serve interface specifica...