Abstract. This paper investigates the design of S-boxes used for combining linear feedback shift register (LFSR) sequences in combination generators. Such combination generators ha...
Abstract--OFDMA based cellular radio networks aim to operate as close as possible to frequency reuse distance of one, where the whole spectrum would be available in every cell. Mod...
We introduce a missing data recovery methodology based on a weighted least squares iterative adaptive approach (IAA). The proposed method is referred to as the missing-data IAA (M...
∗ As one type of stealthy and hard-to-detect attack, lowrate TCP-targeted DDoS attack can seriously throttle the throughput of normal TCP flows for a long time without being noti...