Sciweavers

2436 search results - page 436 / 488
» An Experiment in the Design of Software Agents
Sort
View
VRST
2009
ACM
15 years 6 months ago
A semantic environment model for crowd simulation in multilayered complex environment
Simulating crowds in complex environment is fascinating and challenging, however, modeling of the environment is always neglected in the past, which is one of the essential proble...
Hao Jiang, Wenbin Xu, Tianlu Mao, Chunpeng Li, Shi...
IEEEARES
2008
IEEE
15 years 6 months ago
A Lightweight Security Analyzer inside GCC
This paper describes the design and implementation of a lightweight static security analyzer that exploits the compilation process of the gcc compiler. The tool is aimed at giving...
Davide Pozza, Riccardo Sisto
DEXAW
2007
IEEE
103views Database» more  DEXAW 2007»
15 years 6 months ago
Patterns for Authentication and Authorisation Infrastructures
In line with the growing success of e-commerce demands for an open infrastructure providing security services are growing stronger. Authentication and Authorisation Infrastructure...
Roland Erber, Christian Schläger, Günthe...
HICSS
2007
IEEE
100views Biometrics» more  HICSS 2007»
15 years 6 months ago
The Impact of the NSA Cyber Defense Exercise on the Curriculum at the Air Force Institute of Technology
This paper describes how the curriculum and course format at the Air Force Institute of Technology (AFIT) has evolved based on our experience with the highly-successful Cyber Defe...
Barry E. Mullins, Timothy H. Lacey, Robert F. Mill...
HPDC
2007
IEEE
15 years 6 months ago
Scaling multiplayer online games using proxy-server replication: a case study of Quake 2
Massively Multiplayer Online Games (MMOGs) are an increasingly popular class of real-time interactive distributed applications that require scalable architectures and parallelizat...
Jens Müller 0004, Sergei Gorlatch, Tobias Sch...