Attackers take advantage of any security breach to penetrate an organisation perimeter and exploit hosts as stepping stones to reach valuable assets, deeper in the network. The exp...
Virginia N. L. Franqueira, Raul H. C. Lopes, Pasca...
Continuous improvements in integration scale have made major microprocessor vendors to move to designs that integrate several processor cores on the same chip. Chip-multiprocessor...
Turn-taking behavior is simulated in a coupled-agents system. Each agent is modeled as a mobile robot with two wheels. A recurrent neural network is used to produce the motor outpu...
Planning and steering numerical experiments that involve many simulations are difficult tasks to automate. We describe how a simulation scheduling tool can help experimenters sub...
This paper describes SSSim, the Simple and Scalable Simulator for P2P streaming systems. SSSim is designed for performance and scalability, and allows the simulation of the diffus...