Due to the paramount importance of (wireless) communication systems and computer
networks, in the last decade both resource allocation (RA) and anomaly detection (AD)
problems addressed herein have been intensively studied and numerous solutions have
been proposed in the specialized literature [1]. The RA specially in wireless multiple
access networks and the AD in computer networks are problems of complex nature and
an engineering compromise solution has much appeal in terms of practical and effective
deployment.
networks, in the last decade both resource allocation (RA) and anomaly detection (AD)
problems addressed herein have been intensively studied and numerous solutions have
been proposed in the specialized literature [1]. The RA specially in wireless multiple
access networks and the AD in computer networks are problems of complex nature and
an engineering compromise solution has much appeal in terms of practical and effective
deployment.