This research investigates the automation of security assessment of the static and dynamic properties of cyberinfrastructures, with emphasis on the electrical power grid. We descr...
—This paper deals with a simple but essential two-hop wireless relay network employing network coding and a slotted ALOHA protocol. Network coding is a recent and highly regarded...
— In this paper, we propose a novel asynchronous Media Access Control (MAC) protocol, Opportunistic MAC (OMAC), for Multiple Input Multiple Output (MIMO) ad-hoc networks. The pro...
Abhijeet Bhorkar, B. S. Manoj, Bhaskar D. Rao, Ram...
— Keystroke dynamics exhibit people’s behavioral features which are similar to hand signatures. A major problem hindering the large scale deployment of this technology is its h...
— The analytical end-to-end (e2e) performance of a wireless multihop network is largely unknown, because of the interconnections between several factors involved. Customarily, th...