Abstract—Traditional Dijkstra and Bellman-Ford routing algorithms can only provide the best route to each destination based on a fixed link cost model. We propose a utility-base...
Resource-depletion attacks against IEEE 802.11 access points (APs) are commonly executed by flooding APs with fake authentication requests. Such attacks may exhaust an AP’s memor...
Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhel...
Determining where a given sensor is physically located is a challenging issue. In this paper, we address the localization problem where, initially, a certain number of sensors cal...
—This paper describes a multi-agent based simulation (MABS) framework to construct an artificial electric power market populated with learning agents. The artificial market, na...
Abstract— Separate processing of local luminance and contrast in biological visual systems has been argued to be due to the independence of these two properties in natural image ...