Sciweavers

3614 search results - page 482 / 723
» Numerical Computing with MATLAB
Sort
View
IAW
2003
IEEE
15 years 7 months ago
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks
– Computer Networks connected to the Internet continue to be compromised and exploited by hackers. This is in spite of the fact that many networks run some type of security mecha...
John G. Levine, Richard LaBella, Henry L. Owen, Di...
VISUALIZATION
2003
IEEE
15 years 7 months ago
Visualizing Spatial and Temporal Variability in Coastal Observatories
In this paper, we describe a set of 3D and 4D visualization tools and techniques for CORIE, a complex environmental observation and forecasting system (EOFS) for the Columbia Rive...
Walter Jiménez, Wagner Toledo Corrêa,...
IMR
2003
Springer
15 years 7 months ago
Multilevel Accelerated Optimization for Problems in Grid Generation
The quality of numerical simulations of processes that are modeled by partial differential equations strongly depends on the quality of the mesh that is used for their discretiza...
Markus Berndt, Mikhail J. Shashkov
AINA
2009
IEEE
15 years 7 months ago
How Long is the Lifetime of a Wireless Sensor Network?
Wireless sensor networks (WSNs) are known to be highly energy-constrained and each network’s lifetime has a strong dependence on the nodes’ battery capacity. As such, the netw...
Nok Hang Mak, Winston Khoon Guan Seah
APSCC
2009
IEEE
15 years 7 months ago
The description and calculation of quality of composite services
With the widespread of Web Services (WS), more deployed services are being registered into a services registry, consequently giving rise to a series of problems. A conspicuous one...
Meng Li, Hao-peng Chen, Nan Wang