We present our experience of building a prototype system based on the Utility Model for adaptive multimedia. The Utility Model is proposed to capture the issues and dynamics in mul...
Lei Chen, Shahadat Khan, Kin F. Li, Eric G. Mannin...
Kernel rootkits that modify operating system state to avoid detection are a dangerous threat to system security. This paper presents OSck, a system that discovers kernel rootkits ...
Owen S. Hofmann, Alan M. Dunn, Sangman Kim, Indraj...
Abstract. Game-theoretic analyses of distributed and peer-to-peer systems typically use the Nash equilibrium solution concept, but this explicitly excludes the possibility of strat...
— In interference-limited wireless cellular systems, interference avoidance and interference averaging are widely adopted to combat co-channel interference. In different types of...
Designing cooperative multi-robot systems (MRS) requires expert knowledge both in control and artificial intelligence. Formation control is an important research within the resea...