Запропоновано структурну схему здатної до самонавчання адаптивної експертної системи з інформаційної безпеки. Розроблена модель визначення інформаційного …
We investigate the problem of distributed sensors' failure detection in networks with a small number of defective sensors, whose measurements differ significantly from the neighbor …
C Wang, Q Zhao, CN Chuah - IEEE Transactions on Signal …, 2017 - ieeexplore.ieee.org
We consider the quantitative group testing problem where the objective is to identify defective items in a given population based on results of tests performed on subsets of the …
A Umamaheswari, B Kalaavathi - Cluster Computing, 2019 - Springer
In current years, the use of mobile ad hoc networks (MANETs) has been extensive in many applications, counting some mission dangerous applications, and as such safety has …
C Wang, Q Zhao, CN Chuah - 2015 Information theory and …, 2015 - ieeexplore.ieee.org
We introduce a variation of the classic group testing problem referred to as group testing under sum observations. In this new formulation, when a test is carried out on a group of …
AC Portnoy, A Cohen - 2024 60th Annual Allerton Conference …, 2024 - ieeexplore.ieee.org
In this paper, we propose an efficient multi-stage algorithm for non-adaptive Group Testing (GT) with general correlated prior statistics. The proposed solution can be applied to any …
AC Portnoy, A Cohen - arXiv preprint arXiv:2402.10018, 2024 - arxiv.org
In this paper, we propose an efficient multi-stage algorithm for non-adaptive Group Testing (GT) with general correlated prior statistics. The proposed solution can be applied to any …
J Chen, S Kulkarni - Logical Aspects of Fault-Tolerance (LAFT), 2011 - researchgate.net
The goal of this paper is to bridge the gap between the theory and practice in fault-tolerant systems. Specifically, our goal is to model faults uniformly using transition systems so that …
The denial of service (DoS) attack, in the current scenario, is more vulnerable to the banking system and online transactions. Conventional mechanism of DoS attacks consumes a lot of …