![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
A Machine Learning Approach for Line Outage Identification in Power Systems
This paper addresses power line topology change detection by using only measurement data. As Phasor Measurement Units (PMUs) become widely deployed, power system monitoring and real-time analysis can take adva...
-
Chapter and Conference Paper
An Assessment of Users’ Cyber Security Risk Tolerance in Reward-Based Exchange
This study examines users’ risk-taking behavior in software downloads. We are interested in quantifying the degree of risks that users are willing to take in the cyber security context. We propose conducting a...
-
Chapter and Conference Paper
The Impact of Security Cues on User Perceived Security in e-Commerce
Users are expected to assess the level of security of e-commerce websites before conducting online transactions. In this research, we examine user assessment of security of e-commerce web pages based on cues p...
-
Article
Maximum lifetime coverage preserving scheduling algorithms in sensor networks
In wireless sensor networks, when each target is covered by multiple sensors, sensors can take turns to monitor the targets in order to extend the lifetime of the network. In this paper, we address how to impr...
-
Chapter and Conference Paper
Minimum Delay Routing in Multihop Wireless Networks
End-to-end delay is an important QoS metric in multihop wireless networks such as sensor networks and mesh networks. Along with throughput, end-to-end delay determines the user-experienced data transmission ti...
-
Chapter and Conference Paper
Towards Minimum Delay Broadcasting and Multicasting in Multihop Wireless Networks
End-to-end delay is defined as the total time it takes for a single packet to reach the destination. End-to-end delay, along with end-to-end throughput, is a determinant factor of the user-experienced data tra...
-
Chapter and Conference Paper
Transmission Scheduling for CBR Traffic in Multihop Wireless Networks
In multihop wireless ad hoc networks, interference from transmissions on nearby links makes it difficult to predict available bandwidth and reserve bandwidth for Constant Bit Rate traffic. In this paper, we pr...
-
Article
Journal of combinatorial optimization, special issue on communication networks and internet applications
-
Article
Editorial
-
Chapter
Genetic Code-Based DNA Computation for the Hamiltonian Path Problem