Sciweavers

1447 search results - page 102 / 290
» Simulating Internet Worms
Sort
View
SAINT
2007
IEEE
15 years 8 months ago
Disaster Evacuation Guide: Using a Massively Multiagent Server and GPS Mobile Phones
The ubiquitous environment enables us to build systems that provide individual users with personalized navigation services in cities. In developing such a system, it is necessary ...
Yuu Nakajima, Hironori Shiina, Shohei Yamane, Toru...
ACMACE
2004
ACM
15 years 7 months ago
A synthetic traffic model for Quake3
This paper presents our development of a synthetic traffic model for the interactive online computer game Quake3. The goal is a traffic model that can be used by researchers and I...
Tanja Lang, Philip Branch, Grenville J. Armitage
IADIS
2003
15 years 3 months ago
Effects of Ordered Access Lists in Firewalls
Firewalls are hardware and software systems that protect a network from attacks coming from the Internet. Packet filtering firewalls are efficient, fast and provide a good level o...
Faheem Bukhatwa, Ahmed Patel
128
Voted
SEMWEB
2010
Springer
14 years 11 months ago
Forgetting Fragments from Evolving Ontologies
Abstract. Ontologies underpin the semantic web; they define the concepts and their relationships contained in a data source. An increasing number of ontologies are available on-lin...
Heather S. Packer, Nicholas Gibbins, Nicholas R. J...
CORR
2007
Springer
110views Education» more  CORR 2007»
15 years 1 months ago
Graph Annotations in Modeling Complex Network Topologies
abstract such additional information as network annotations. We introduce a network topology modeling framework that treats annotations as an extended correlation profile of a net...
Xenofontas A. Dimitropoulos, Dmitri V. Krioukov, A...