Sciweavers

46 search results - page 1 / 10
» Black holes
Sort
View
MCU
2004
141views Hardware» more  MCU 2004»
13 years 6 months ago
Abstract Geometrical Computation for Black Hole Computation
geometrical computation for Black hole computation d abstract) J
Jérôme Durand-Lose
FUIN
2006
93views more  FUIN 2006»
13 years 4 months ago
Abstract Geometrical Computation 1: Embedding Black Hole Computations with Rational Numbers
geometrical computation 1 : embedding Black hole computations with rational numbers J
Jérôme Durand-Lose
JNW
2008
153views more  JNW 2008»
13 years 4 months ago
Prevention of Co-operative Black Hole Attack in MANET
Latha Tamilselvan, V. Sankaranarayanan
FGCN
2007
IEEE
173views Communications» more  FGCN 2007»
13 years 6 months ago
Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation
A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route r...
Hesiri Weerasinghe, Huirong Fu
SSDBM
2011
IEEE
239views Database» more  SSDBM 2011»
12 years 8 months ago
Recipes for Baking Black Forest Databases - Building and Querying Black Hole Merger Trees from Cosmological Simulations
Large-scale N-body simulations play an important role in advancing our understanding of the formation and evolution of large structures in the universe. These computations require ...
Julio López, Colin Degraf, Tiziana DiMatteo...