Skip to main content
Exploring the symbiotic nature of biological systems can result in valuable knowledge for computer networks. Biolog ically inspired approaches to security in networks are interesting to evaluate because of the analogies between network... more
    • by 
    • Computer Network Security
Biological Immune Systems have intelligent capabilities of detecting foreign bodies which attack our body. Moreover they have inherent insightful capabilities to remember them, when they hit the body again. Primary response is the initial... more
    • by 
Exploring the symbiotic nature of biological systems can result in valuable knowledge for computer networks. Biologically inspired approaches to security in networks are interesting to evaluate because of the analogies between network... more
    • by 
    •   6  
      Computer ScienceArtificial IntelligenceInformation SecurityMachine Learning
Communicable disease models have been studied using classical mathematical differential equations for a long time now. However, these classical models do not always accurately represent the complex network behavior that governs the spread... more
    • by 
    • Differential Equations
Social networks are susceptible to rapid spread of malicious information, commonly referred to as rumors. Rumors often spread rapidly through the network and, if not contained quickly, can be harmful. This paper describes a method for... more
    • by 
Admission control is an important component for end-to-end Quality of Service (QoS) delivery in IP networks using resource reservation and determines how bandwidth and latency are allocated to streams with various requirements. Admission... more
    • by 
The increase of IEEE 802.11's bandwidth led to a deployment of many multimedia applications over wireless networks. Nevertheless, these applications impose rigorous discipline constraints in QoS. To support the varying Quality-of-Service... more
    • by 
    •   6  
      Video StreamingVideo TransmissionDynamic Software AdaptationPacket Loss
Applying trust in Wireless Sensor network (WSN) is an emerging area where researchers are engrossed in developing novel design archetype to address the security issues. Security plays an important role in WSN where trustworthy sensor node... more
    • by  and +1
Trust plays a crucial role in establishing and retaining relationships. Sociopsychological analysis identifies three major constructs, such as ability, benevolence and integrity, upon which trust is being built up. On a similar note, in a... more
    • by  and +1
Evolution of implantable medical devices for human beings has provided a radical new way for treating chronic diseases such as diabetes, cardiac arrhythmia, cochlear, gastric diseases etc. Implantable medical devices have provided a... more
    • by 
    • Machine Learning
Distracted pedestrians, akin to their distracted driver counterparts, are an increasingly dangerous threat and precursors to pedestrian accidents in urban communities, often resulting in grave injuries and fatalities. Mitigating such... more
    • by 
    • Computer Science
Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000.
    • by 
Diabetic patients use therapy from the insulin pump, a type of implantable medical device, for the infusion of insulin to control blood glucose level. While these devices offer many clinical benefits, there has been a recent increase in... more
    • by 
    •   2  
      Computer ScienceMultilayer Perceptron
Cyber-physical systems (CPS) is a setup that controls and monitors the physical world around us. The advancement of these systems needs to incorporate an unequivocal spotlight on making these systems efficient. Blockchains and their... more
    • by 
    •   5  
      Computer ScienceAnalytical ChemistryMedicineCyber Physical System
    • by 
    • Electrical and Electronic Engineering
Software Defined Networking (SDN) is an emerging architecture providing services on a priority basis for real-time communication, by pulling out the intelligence from the hardware and developing a better management system for effective... more
    • by 
    •   2  
      Computer ScienceSoftware defined networking
    • by 
We present mmMoReEdge, a modular and reconfigurable mmWave testbed inspired by edge computing architecture found in IoT devices. In mmMoReEdge, complex signal processing, typically required for 5G testing, is performed on the edge (local... more
    • by 
Pedestrian safety continues to be a significant concern in urban communities and pedestrian distraction is emerging as one of the main causes of grave and fatal accidents involving pedestrians. The advent of sophisticated mobile and... more
    • by 
    • Computer Science
A book
    • by