Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...
Abstract. The trend towards cloud and utility computing infrastructures raises challenges not only for application development, but also for management: diverse resources, changing...
Abstract—We develop and evaluate a new method for estimating and optimizing various performance metrics for multihop wireless networks, including MANETs. We introduce an approxim...
John S. Baras, Vahid Tabatabaee, George Papageorgi...
Abstract— Modern day wireless networks are increasingly supporting various civilian applications that require high bandwidth for successful operation. In such cases, it is import...
Abstract—Directional antennas are expected to provide significant improvements over omni-directional antennas in wireless ad hoc networks. Directional MAC protocols, however, int...