Learn More
Network-based attacks can be either persistent or sporadic. Persistent attack flows can be relatively easy to trace by mechanisms such as probabilistic packet marking, traffic logging, data mining etc. Sporadic attacks are sometimes easily detected by the Intrusion Detection Systems (IDSs) at the victims, but are hard to trace back to the attack origins. We(More)
In this paper we introduce two novel control slot scheduling approaches for creating dynamic contention free Time Division Multiple Access (TDMA) schedules. Our approaches are ideal for exchanging control information in Mobile Ad hoc Networks (MANET) and wireless mesh networks so that dynamic resource needs of participating nodes can be rapidly accommodated(More)
INTRODUCTION No data has been reported on the prevalence of asthma in highland rural areas of Vietnam. We attempt to determine the prevalence of asthma and asthma-like symptoms in Dalat, a Vietnamese city at 1,500 m altitude, and to learn about environmental influences, patient attitudes toward diagnosis and treatment, and the prevalent general knowledge(More)
  • 1