—We consider a scenario in which users share an access point and are mainly interested in VoIP applications. Each user is allowed to adapt to varying network conditions by choosi...
The use of dynamic access control policies for threat response adapts local response decisions to high level system constraints. However, security policies are often carefully tigh...
Interconnected service providers constitute a highly dynamic, complex, distributed environment. Multi-agent system design-methodologies have been trying to address this kind of env...
The emerging science of simulation enables us to explore the dynamics of large and complex systems even if a formal representation and analysis of the system is intractable and a ...
Current methods that interactively render reasonably complex CSG objects are image based and are severely bandwidth limited. This paper presents a new approach to raytracing CSG o...
Fabiano Romeiro, Luiz Velho, Luiz Henrique de Figu...