Sciweavers

5234 search results - page 886 / 1047
» Simulation of Computer Network Attacks
Sort
View
ICPADS
2010
IEEE
15 years 1 months ago
M-cube: A Duty Cycle Based Multi-channel MAC Protocol with Multiple Channel Reservation for WSNs
In this paper, a duty cycle based multi-channel MAC protocol with multiple channel reservation, called M-cube, is proposed to tackle the triple hidden terminal problems. M-cube can...
Jinbao Li, Desheng Zhang, Longjiang Guo, Shouling ...
140
Voted
CF
2009
ACM
15 years 1 months ago
High accuracy failure injection in parallel and distributed systems using virtualization
Emulation sits between simulation and experimentation to complete the set of tools available for software designers to evaluate their software and predict behavior under condition...
Thomas Hérault, Thomas Largillier, Sylvain ...
149
Voted
EVOW
2009
Springer
15 years 1 months ago
Evolutionary Approaches for Strain Optimization Using Dynamic Models under a Metabolic Engineering Perspective
One of the purposes of Systems Biology is the quantitative modeling of biochemical networks. In this effort, the use of dynamical mathematical models provides for powerful tools in...
Pedro Evangelista, Isabel Rocha, Eugénio C....
HCI
2009
15 years 1 months ago
Can Neurophysiologic Synchronies Provide a Platform for Adapting Team Performance?
We have explored using neurophysiologic patterns as an approach for developing a deeper understanding of how teams collaborate when solving time-critical, complex real-world proble...
Ronald H. Stevens, Trysha Galloway, Chris Berka, M...
MOBISYS
2004
ACM
16 years 3 months ago
Improving the Latency of 802.11 hand-offs using Neighbor Graphs
The 802.11 IEEE Standard has enabled low cost and effective wireless LAN services (WLAN). With the sales and deployment of WLAN based networks exploding, many people believe that ...
Minho Shin, Arunesh Mishra, William A. Arbaugh