Sciweavers

5234 search results - page 842 / 1047
» Simulation of Computer Network Attacks
Sort
View
CONPAR
1994
15 years 8 months ago
The Rewrite Rule Machine Node Architecture and Its Performance
The Rewrite Rule Machine (RRM) is a massively parallel MIMD/SIMD computer designed with the explicit purpose of supporting veryhigh-level parallel programming with rewrite rules. T...
Patrick Lincoln, José Meseguer, Livio Ricci...
ATAL
2008
Springer
15 years 6 months ago
Autonomous virtual humans and lower animals: from biomechanics to intelligence
The confluence of virtual reality and artificial life, an emerging discipline that spans the computational and biological sciences, has yielded synthetic worlds inhabited by reali...
Demetri Terzopoulos
ICST
2010
IEEE
15 years 2 months ago
GraphSeq: A Graph Matching Tool for the Extraction of Mobility Patterns
Mobile computing systems provide new challenges for verification. One of them is the dynamicity of the system structure, with mobility-induced connections and disconnections, dynam...
Minh Duc Nguyen, Hélène Waeselynck, ...
HPDC
2006
IEEE
15 years 10 months ago
XtremLab: A System for Characterizing Internet Desktop Grids
Desktop grid (DG) systems use the idle computing power of many volunteered desktop PC’s on the Internet to support large-scale computation and storage. For over a decade, DG sys...
Paul Malecot, Derrick Kondo, Gilles Fedak
WWW
2006
ACM
16 years 5 months ago
Probabilistic models for discovering e-communities
The increasing amount of communication between individuals in e-formats (e.g. email, Instant messaging and the Web) has motivated computational research in social network analysis...
Ding Zhou, Eren Manavoglu, Jia Li, C. Lee Giles, H...