|
|
|
Kexiang Qian, Hongyu Yang, Ruyu Li, Weizhe Chen, Xi Luo and Lihua Yin
With the rapid growth of IoT devices, the threat of botnets is becoming increasingly worrying. There are more and more intelligent detection solutions for botnets that have been proposed with the development of artificial intelligence. However, due to th...
ver más
|
|
|
|
|
|
Phillip Kerger, David E. Bernal Neira, Zoe Gonzalez Izquierdo and Eleanor G. Rieffel
We present two algorithms in the quantum CONGEST-CLIQUE model of distributed computation that succeed with high probability: one for producing an approximately optimal Steiner tree, and one for producing an exact directed minimum spanning tree, each of w...
ver más
|
|
|
|
|
|
Stefan Dobrev, Paola Flocchini, Giuseppe Prencipe and Nicola Santoro
Consider a set of k identical asynchronous mobile agents located in an anonymous ring of n nodes. The classical Gather (or Rendezvous) problem requires all agents to meet at the same node, not a priori decided, within a finite amount of time. This proble...
ver más
|
|
|
|
|
|
Ruikui Ma, Qiuqian Wang, Xiangxi Bu and Xuebin Chen
With the development of the Internet of Things, a huge number of devices are connected to the network, network traffic is exhibiting massive and low latency characteristics. At the same time, it is becoming cheaper and cheaper to launch DDoS attacks, and...
ver más
|
|
|
|
|
|
Preethika Kasu, Prince Hamandawana and Tae-Sun Chung
Various components are involved in the end-to-end path of data transfer. Protecting data integrity from failures in these intermediate components is a key feature of big data transfer tools. Although most of these components provide some degree of data i...
ver más
|
|
|