In this paper we present a mixed qualitative and quantitative approach for evaluation of Information Technology (IT) security investments. For this purpose, we model security scen...
In this paper, we study the use of continuous-time hidden Markov models (CT-HMMs) for network protocol and application performance evaluation. We develop an algorithm to infer the...
This paper addresses the evaluation of a fault-tolerant model for tactic operations of mobile robotic groups. The coordinated action of the group is planned with Genetic Algorithm...
— In this paper, we discuss and evaluate our two metro wavelength division multiplexing (WDM) ring network architectures for variable-length packet traffic. The paper begins with...
Bernardi Pranggono, Rashid Mehmood, Jaafar M. H. E...
— Cognitive networks are the latest progression of cognitive functionality into the networking stack, an effort which began with a layer one and two focus on cognitive radios, an...
Muthukumaran Pitchaimani, Benjamin J. Ewy, Joseph ...