In this chapter we consider a cell phone network as a set of automatically deployed sensors that records movement and interaction patterns of the population. We discuss methods fo...
With the continuous evolution of the types of attacks against computer networks, traditional intrusion detection systems, based on pattern matching and static signatures, are incr...
Abstract--Many efforts are centered around creating largescale networks of "smart things" found in the physical world (e.g., wireless sensor and actuator networks, embedd...
Abstract— In conventional wireless systems with layered architectures, the physical layer treats all data streams from upper layers equally and apply the same modulation and codi...
As the number of integrated IP cores in the current System-on-Chips (SoCs) keeps increasing, communication requirements among cores can not be sufficiently satisfied using either ...
Jun Ho Bahn, Seung Eun Lee, Yoon Seok Yang, Jungso...