Sciweavers

17680 search results - page 238 / 3536
» Simulation of Computer Systems and Applications
Sort
View
137
Voted
ASPLOS
2011
ACM
14 years 7 months ago
Mementos: system support for long-running computation on RFID-scale devices
Transiently powered computing devices such as RFID tags, kinetic energy harvesters, and smart cards typically rely on programs that complete a task under tight time constraints be...
Benjamin Ransford, Jacob Sorber, Kevin Fu
110
Voted
GECCO
2005
Springer
132views Optimization» more  GECCO 2005»
15 years 9 months ago
Evolving computer intrusion scripts for vulnerability assessment and log analysis
Evolutionary computation is used to construct undetectable computer attack scripts. Using a simulated operating system, we show that scripts can be evolved to cover their tracks a...
Julien Budynek, Eric Bonabeau, Ben Shargel
114
Voted
CW
2006
IEEE
15 years 9 months ago
Error Minimising Pipeline for Hi-Fidelity, Scalable Geospatial Simulation
The geospatial category of simulations is used to show how origin centric techniques can solve a number of accuracy related problems common to 3D computer graphics applications. P...
Chris Thorne
138
Voted
ESAW
2007
Springer
15 years 10 months ago
Multi-agent Simulation to Implementation: A Practical Engineering Methodology for Designing Space Flight Operations
OCAMS is a practical engineering application of multi-agent systems technology, involving redesign of the tools and practices in a complex, distributed system. OCAMS is designed to...
William J. Clancey, Maarten Sierhuis, Chin Seah, C...
157
Voted
CONEXT
2006
ACM
15 years 9 months ago
Virtual networks under attack: disrupting internet coordinate systems
Internet coordinate-based systems are poised to become an important service to support overlay construction and topology-aware applications. Indeed, through network distance embed...
Mohamed Ali Kâafar, Laurent Mathy, Thierry T...