Sciweavers

523 search results - page 49 / 105
» A simulation model for military deployment
Sort
View
85
Voted
CORR
2004
Springer
80views Education» more  CORR 2004»
15 years 12 days ago
Notes On The Design Of An Internet Adversary
The design of the defenses Internet systems can deploy against attack, especially adaptive and resilient defenses, must start from a realistic model of the threat. This requires an...
David S. H. Rosenthal, Petros Maniatis, Mema Rouss...
89
Voted
AAAI
2006
15 years 2 months ago
A Platform to Evaluate the Technology for Service Discovery in the Semantic Web
Since the description of the Semantic Web paradigm in 2001, technology has been proposed to allow its deployment and use. However, there is not yet any large and widely deployed s...
Cécile Aberg, Johan Aberg, Patrick Lambrix,...
126
Voted
DSRT
2008
IEEE
15 years 2 months ago
Two Complementary Tools for the Formal Testing of Distributed Systems with Time Constraints
The complexity and the variety of the deployed timedependent systems, as well as the high degree of reliability required for their global functioning, justify the care provided to...
Ana R. Cavalli, Edgardo Montes de Oca, Wissam Mall...
104
Voted
CN
2006
83views more  CN 2006»
15 years 18 days ago
A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms
This paper presents an assessment of the communication overheads of IPsec and evaluates the feasibility of deploying it on handheld devices for the UMTS architecture. A wide range...
Christos Xenakis, Nikolaos Laoutaris, Lazaros F. M...
104
Voted
CORR
2010
Springer
135views Education» more  CORR 2010»
15 years 20 days ago
A stochastic analysis of greedy routing in a spatially-dependent sensor network
For a sensor network, as tractable spatially-dependent node deployment model is presented with the property that the density is inversely proportional to the sink distance. A stoc...
H. Paul Keeler