Sciweavers

76 search results - page 10 / 16
» An Architecture for Hierarchical Collision Detection
Sort
View
87
Voted
CCS
2007
ACM
15 years 3 months ago
A k-anonymous communication protocol for overlay networks
Anonymity is increasingly important for network applications concerning about censorship and privacy. The existing anonymous communication protocols generally stem from mixnet and...
Pan Wang, Peng Ning, Douglas S. Reeves
TEC
2002
166views more  TEC 2002»
14 years 9 months ago
An artificial immune system architecture for computer security applications
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect ...
Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch,...
ICAS
2008
IEEE
200views Robotics» more  ICAS 2008»
15 years 4 months ago
Connectivity of Thetis, a Distributed Hybrid Simulator, with a Mixed Control Architecture
—The purpose of this paper is to present the linkage of Thetis (a real time multi-vehicles hybrid simulator for heterogeneous vehicles) with a control architecture for the manage...
Olivier Parodi, Abdellah El Jalaoui, David Andreu
ACMSE
2004
ACM
15 years 3 months ago
A P2P intrusion detection system based on mobile agents
Traditional intrusion detection systems have a central coordinator with a static hierarchical architecture. We propose a peer-to-peer intrusion detection system that has no centra...
Geetha Ramachandran, Delbert Hart
JSA
2008
74views more  JSA 2008»
14 years 9 months ago
Resource conflict detection in simulation of function unit pipelines
Processor simulators are important parts of processor design toolsets in which they are used to verify and evaluate the properties of the designed processors. While simulating arch...
Pekka Jääskeläinen, Vladimír...