In defending against various network attacks, such as distributed denial-of-service (DDoS) attacks or worm attacks, a defense system needs to deal with various network conditions a...
Cliff Changchun Zou, Nick G. Duffield, Donald F. T...
We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically stop functioning due to operational failu...
This paper models supply chain (SC) uncertainties by fuzzy sets and develops a possibilistic SC configuration model for new products with unreliable or unavailable SC statistical...
Large scale video streaming over Internet requires a large amount of resources such as server I/O bandwidth, network bandwidth. A number of video delivery techniques can be used to...
In a steel tube mill where an endless stream of steel tube is supplied from a manufacturing facility, trim waste is never made regardless of cutting patterns used and the standard...