Sciweavers

2349 search results - page 429 / 470
» Performing time-sensitive network experiments
Sort
View
GECCO
2007
Springer
178views Optimization» more  GECCO 2007»
15 years 3 months ago
Coevolution of intelligent agents using cartesian genetic programming
A coevolutionary competitive learning environment for two antagonistic agents is presented. The agents are controlled by a new kind of computational network based on a compartment...
Gul Muhammad Khan, Julian Francis Miller, David M....
SP
2006
IEEE
121views Security Privacy» more  SP 2006»
15 years 3 months ago
On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques
Timing-based active watermarking schemes are developed to trace back attackers through stepping stone connections or anonymizing networks. By slightly changing packet timing, thes...
Pai Peng, Peng Ning, Douglas S. Reeves
LCTRTS
2005
Springer
15 years 3 months ago
Efficient application migration under compiler guidance
Mobile computing based upon wireless technology as the interconnect and PDAs, Web-enabled cell phones etc. as the end devices provide a rich infrastructure for anywhere, anytime i...
Kun Zhang, Santosh Pande
P2P
2003
IEEE
157views Communications» more  P2P 2003»
15 years 3 months ago
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems
Decentralized Peer to Peer (P2P) networks offer both opportunities and threats. Its open and decentralized nature makes it extremely susceptible to malicious users spreading harmf...
Aameek Singh, Ling Liu
ICSOC
2009
Springer
15 years 2 months ago
Message-Oriented Middleware with QoS Awareness
Publish/subscribe messaging is a fundamental mechanism for interconnecting disparate services and systems in the service-oriented computing architecture. The quality of services (Q...
Hao Yang, Minkyong Kim, Kyriakos Karenos, Fan Ye, ...