Abstract— This paper describes the generation of fuzzy signatures to detect some cyber attacks. This approach is an enhancement to our previous work, which was based on the princ...
Many Layered Multicast (LM) congestion control schemes have been proposed to serve different users with heterogeneous bandwidth requirements. Most of the LM algorithms suffer from...
Li Zhu, Nirwan Ansari, Zafer Sahinoglu, Anthony Ve...
We try to analyze a generic model for 2-tier distributed systems, exploring the possibility of optimal cluster sizes from an information management perspective, such that the over...
Resource discovery is a problem common to almost all distributed systems. Instead of resulting in a one or a small number of discovery mechanisms, completely different and incompa...
The biggest limitation of Radio over Fiber (ROF) links in a wireless network is its limited dynamic range due to ‘Non Linear Distortions’ (NLD). In this paper a higher orde...