Sciweavers

5234 search results - page 792 / 1047
» Simulation of Computer Network Attacks
Sort
View
MOBIWAC
2009
ACM
15 years 11 months ago
The sociable traveller: human travelling patterns in social-based mobility
Understanding how humans move is a key factor for the design and evaluation of networking protocols and mobility management solutions in mobile networks. This is particularly true...
Chiara Boldrini, Marco Conti, Andrea Passarella
MOBIHOC
2008
ACM
16 years 4 months ago
Using persistent homology to recover spatial information from encounter traces
In order to better understand human and animal mobility and its potential effects on Mobile Ad-Hoc networks and Delay-Tolerant Networks, many researchers have conducted experiment...
Brenton D. Walker
DSN
2000
IEEE
15 years 9 months ago
Fault-Secure Scheduling of Arbitrary Task Graphs to Multiprocessor Systems
In this paper, we propose new scheduling algorithms to achieve fault security in multiprocessor systems. We consider scheduling of parallel programs represented by directed acycli...
Koji Hashimoto, Tatsuhiro Tsuchiya, Tohru Kikuno

Publication
303views
14 years 2 months ago
Evolutionary synthesis of analog networks
he significant increase in the available computational power that took place in recent decades has been accompanied by a growing interest in the application of the evolutionary ap...
Claudio Mattiussi
ICRA
2005
IEEE
111views Robotics» more  ICRA 2005»
15 years 10 months ago
Information Based Distributed Control for Biochemical Source Detection and Localization
— The paper proposes several improvements on the Direction of Gradient (DOG) algorithm proposed in [1] for detecting and localizing a biochemical source with moving sensors. In p...
Panos Tzanos, Milos Zefran, Arye Nehorai