Sciweavers

5234 search results - page 895 / 1047
» Simulation of Computer Network Attacks
Sort
View
106
Voted
WICON
2008
15 years 5 months ago
Game-based admission control for wireless systems
Much previous work has examined the wireless power control problem using tools from game theory, an economic concept which describes the behavior of interdependent but non-coopera...
Benjamin Yolken, Nicholas Bambos
128
Voted
AAAI
2000
15 years 5 months ago
Collective Intelligence and Braess' Paradox
We consider the use of multi-agent systems to control network routing. Conventional approaches to this task are based on Ideal Shortest Path routing Algorithm (ISPA), under which ...
Kagan Tumer, David Wolpert
131
Voted
WORM
2003
15 years 5 months ago
Worm anatomy and model
We present a general framework for reasoning about network worms and analyzing the potency of worms within a specific network. First, we present a discussion of the life cycle of ...
Dan Ellis
129
Voted
GISCIENCE
2008
Springer
112views GIS» more  GISCIENCE 2008»
15 years 4 months ago
Decentralized Movement Pattern Detection amongst Mobile Geosensor Nodes
Movement patterns, like flocking and converging, leading and following, are examples of high-level process knowledge derived from lowlevel trajectory data. Conventional techniques...
Patrick Laube, Matt Duckham, Thomas Wolle
144
Voted
CCR
2004
113views more  CCR 2004»
15 years 3 months ago
Implementing aggregation and broadcast over Distributed Hash Tables
Peer-to-peer (P2P) networks represent an effective way to share information, since there are no central points of failure or bottleneck. However, the flip side to the distributive...
Ji Li, Karen R. Sollins, Dah-Yoh Lim