Wei-Kai Wu

Learn More
Identifying the sources of an attack is an important task in the Internet security area. An attack could consist of a large number of packet streams generated by many compromised slaves that consume resources associated with various network elements to deny normal services or a few offending packets to disable a system. Several techniques based on(More)
Most previous works on urban traffic efficiency focused on the optimization of signal timings, assuming vehicle speed was fixed or followed a giving distribution. In this paper, based on the two way communication between vehicles and signal controller in Connected Vehicle (CV) environment, we developed two vehicle speed guidance methods to decrease delay(More)
  • 1