Mobile collaborative environments, being naturally loosely-coupled, call for optimistic replication solutions in order to attain the requirement of decentralized highly available ...
Systems are attempting to detect botnets by examining traffic content for IRC commands or by setting up honeynets. Our approach for detecting botnets is to examine flow characteri...
W. Timothy Strayer, Robert Walsh, Carl Livadas, Da...
— This paper examines the bit error probability (BEP) of bit-interleaved coded modulation and iterative decoding (BICM-ID) in OFDM systems with modulation diversity (MD) over cor...
In this paper, we analyze attacks on existing time synchronization protocols for wireless sensor networks. We propose a secure time synchronization toolbox to counter these attack...
This paper proposes an ambient interactive and responsive environment (AIRE) to improve user’s image browsing experiences on the small-form-factor devices. This solution is char...