L. Peluso

Learn More
Keywords: Trustworthiness Network security Autonomic communication Information fusion Dempster Shafer theory a b s t r a c t Several research efforts have recently focused on achieving distributed anomaly detection in an effective way. As a result, new information fusion algorithms and models have been defined and applied in order to correlate information(More)
—Measurement of the main contributions to the single-hop delay introduced by an open-source router is dealt with. A new method is proposed, which is capable of distinguishing the time interval during which a generic packet stays in either input or output queue (queuing delay) of the router under analysis and the time interval characterizing the effective(More)
vi SUMMARY Freeze-drying of sediment samples has been shown to be an effective tool for increasing the solids content of the sediments without adversely affecting the non-volatile chemicals of concern within the samples. This technique can be applied to a wide range of matrices, for example plant tissue, where low solids content has the effect of raising(More)
  • 1