The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network decontamination (or disinfection) is a widely studied problem in distributed computing. Network sites are assumed to be contaminated (e.g., by a virus) and a team of agents is deployed to decontaminate the whole network. In the vast literature a variety of assumptions are made on the power of the agents, which can typically communicate, exchange information, remember the past, etc. ...
The single attractor cellular automata (SACA) is of prime interest in devising schemes for different applications specially in authentication and cryptography. The synthesis of SACA in linear/additive domain has been proposed in literature. This work reports characterization of such a special class of CA beyond linear domain. The characterization is based on the analysis of individual CA rule and...
Nowadays, remote sensing is used in many environmental applications, helping to solve and improve the social problems derived from them. Examples of remotely sensed applications include soil quality studies, water resources searching, environmental protection or meteorology simulations. The classification algorithms are one of the most important techniques used in remote sensing that help developers...
We study the effects of coupling of the Distributed Denial of Service (DDoS) attack with routing on a packet switching network (PSN) performance measured by throughput. We conduct our study using PSN model that it is an abstraction of the Network Layer of the 7-Layer ISO OSI Reference Model. Our study demonstrates that even a very “weak” DDoS attack on a network using static routing causes degradation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.