Sciweavers

5234 search results - page 804 / 1047
» Simulation of Computer Network Attacks
Sort
View
NOSSDAV
2005
Springer
15 years 10 months ago
Mitigating information exposure to cheaters in real-time strategy games
Cheating in on-line games is a prevalent problem for both game makers and players. The popular real-time strategy game genre is especially vulnerable to cheats, as it is frequentl...
Chris Chambers, Wu-chang Feng, Wu-chi Feng, Debanj...
OTM
2005
Springer
15 years 10 months ago
Event Broker Grids with Filtering, Aggregation, and Correlation for Wireless Sensor Data
Abstract. A significant increase in real world event monitoring capability with wireless sensor networks brought a new challenge to ubiquitous computing. To manage high volume and...
Eiko Yoneki
149
Voted
ICT
2004
Springer
128views Communications» more  ICT 2004»
15 years 10 months ago
SRBQ and RSVPRAgg: A Comparative Study
Abstract This paper presents a comparative evaluation of the Scalable ReservationBased QoS (SRBQ) and the RSVP Reservation Aggregation (RSVPRAgg) architectures, both designed to pr...
Rui Prior, Susana Sargento, Pedro Brandão, ...
IPSN
2004
Springer
15 years 10 months ago
Entropy-based sensor selection heuristic for target localization
We propose an entropy-based sensor selection heuristic for localization. Given 1) a prior probability distribution of the target location, and 2) the locations and the sensing mod...
Hanbiao Wang, Kung Yao, Gregory J. Pottie, Deborah...
HIPC
2003
Springer
15 years 9 months ago
Designing SANs to Support Low-Fanout Multicasts
Abstract. System area networks (SANs) need to support low-fanout multicasts efficiently in addition to broadcasts and unicasts. A critical component in SANs is the switch, which i...
Rajendra V. Boppana, Rajesh Boppana, Suresh Chalas...