: Intrusion detection systems continuously watch the activity of a network or computer, looking for attack or intrusion evidences. However, hostbased intrusion detectors are partic...
We argue that the design principles of the TCP timeout algorithm are based solely on RTT estimations and may lead to flow synchronization, unnecessary retransmission effort and ...
In this paper, we study a new concept of traffic grooming in wavelength-division multiplexing (WDM) ring networks that aims at eliminating both the bandwidth underutilization and ...
Ultra wideband (UWB) technology based primarily on the impulse radio paradigm has a huge potential for revolutionizing the world of digital communications especially wireless comm...
This paper presents an interaction taxonomy for classifying and identifying requirement interactions in software systems. The proposed taxonomy is in the form of a four-layered py...
Mohamed Shehata, Armin Eberlein, Abraham O. Fapoju...