Sciweavers

5234 search results - page 946 / 1047
» Simulation of Computer Network Attacks
Sort
View
106
Voted
SIGCOMM
2004
ACM
15 years 8 months ago
Optimizing cost and performance for multihoming
Multihoming is often used by large enterprises and stub ISPs to connect to the Internet. In this paper, we design a series of novel smart routing algorithms to optimize cost and p...
David Kiyoshi Goldenberg, Lili Qiu, Haiyong Xie 00...
GCC
2004
Springer
15 years 8 months ago
End Host Multicast for Peer-to-Peer Systems
Abstract. Multicast is an effective means for conducting the cooperative P2P communications. This paper studies an algorithm to construct a scalable and efficient end host multica...
Wanqing Tu, Weijia Jia
ICANN
2009
Springer
15 years 8 months ago
How Bursts Shape the STDP Curve in the Presence/Absence of GABAergic Inhibition
It has been known for some time that the synapses of the CA1 pyramidal cells are surprisingly unreliable at signalling the arrival of single spikes to the postsynaptic neuron [2]. ...
Vassilis Cutsuridis, Stuart Cobb, Bruce P. Graham
103
Voted
CORR
2008
Springer
97views Education» more  CORR 2008»
15 years 3 months ago
Modeling Cultural Dynamics
EVOC (for EVOlution of Culture) is a computer model of culture that enables us to investigate how various factors such as barriers to cultural diffusion, the presence and choice o...
Liane Gabora
ADHOC
2006
113views more  ADHOC 2006»
15 years 3 months ago
Positioning using local maps
ct 9 It is often useful to know the positions of nodes in a network. However, in a large network it is impractical to build a 10 single global map. In this paper, we present a new ...
Yi Shang, Wheeler Ruml, Markus P. J. Fromherz