This paper examines the denial of service attacks that an 802.16 Broadband Wireless Access network is susceptible to at the physical and medium access control layers. In our threa...
Software development managers strive to control all of the factors that might impact the success of their projects. However, not all of these factors have been identified, much le...
Design and implementation of distributed algorithms often involve many subtleties due to their complex structure, non-determinism, and low atomicity as well as occurrence of unanti...
Ananda Basu, Borzoo Bonakdarpour, Marius Bozga, Jo...
This paper presents a visual-servoing method that is based on 2-D ultrasound (US) images. The main goal is to guide a robot actuating a 2-D US probe in order to reach a desired cro...
Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security problems on the Internet. A particularly sophi...
Brett Stone-Gross, Marco Cova, Bob Gilbert, Richar...