Sciweavers

5234 search results - page 791 / 1047
» Simulation of Computer Network Attacks
Sort
View
NCA
2010
IEEE
14 years 11 months ago
Anatomy-based organization of morphology and control in self-reconfigurable modular robots
In this paper we address the challenge of realizing full-body behaviors in scalable modular robots. We present an experimental study of a biologically inspired approach to organize...
David Johan Christensen, Jason Campbell, Kasper St...
WWW
2001
ACM
16 years 5 months ago
Using proxy cache relocation to accelerate Web browsing in wireless/mobile communications
Mobile computing is considered of major importance to the computing industry for the forthcoming years due to the progress in the wireless communications area. A proxy-based archi...
Stathes Hadjiefthymiades, Lazaros F. Merakos
CANDC
2009
ACM
15 years 11 months ago
A sub-symbolic model of the cognitive processes of re-representation and insight
We present a sub-symbolic computational model for effecting knowledge re-representation and insight. Given a set of data, manifold learning is used to automatically organize the d...
Dan Ventura
CCGRID
2002
IEEE
15 years 9 months ago
Maintaining Connectivity in a Scalable and Robust Distributed Environment
This paper describes a novel peer-to-peer (P2P) environment for running distributed Java applications on the Internet. The possible application areas include simple load balancing...
Márk Jelasity, Mike Preuß, Maarten va...
SENSYS
2009
ACM
15 years 11 months ago
Achieving range-free localization beyond connectivity
Wireless sensor networks have been proposed for many location-dependent applications. In such applications, the requirement of low system cost prohibits many range-based methods f...
Ziguo Zhong, Tian He