—In this paper, we consider routing in multi-hop wireless mesh networks. We analyze three standardized and commonly deployed routing mechanisms that we term “nodepair discovery...
A number of methods have been proposed over the last decade for embedding information within deoxyribonucleic acid (DNA). Since a DNA sequence is conceptually equivalent to a unid...
Botnets have become the most powerful tool for attackers to victimize countless users across cyberspace. Previous work on botnet detection has mainly focused on identifying infecte...
Jose Andre Morales, Erhan J. Kartaltepe, Shouhuai ...
— Cooperative distributed model predictive control has recently been shown to provide stabilizing feedback for plants composed of any finite number of dynamically coupled subsys...
Brett T. Stewart, Aswin N. Venkat, James B. Rawlin...
Linguistic Steganography is concerned with hiding information in natural language text. One of the major transformations used in Linguistic Steganography is synonym substitution. ...