Sciweavers

1266 search results - page 30 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
SIGGRAPH
1999
ACM
15 years 4 months ago
Real-Time Acoustic Modeling for Distributed Virtual Environments
Realistic acoustic modeling is essential for spatializing sound in distributed virtual environments where multiple networked users move around and interact visually and aurally in...
Thomas A. Funkhouser, Patrick Min, Ingrid Carlbom
JSAC
2006
127views more  JSAC 2006»
14 years 11 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
ATAL
2000
Springer
15 years 4 months ago
Performance of Coordinating Concurrent Hierarchical Planning Agents Using Summary Information
Abstract. Recent research has provided methods for coordinating the individually formed concurrent hierarchical plans (CHiPs) of a group of agents in a shared environment. A reason...
Bradley J. Clement, Edmund H. Durfee
WSC
2001
15 years 1 months ago
Distributed simulation: an enabling technology for the evaluation of virtual enterprises
This paper presents an application distributed simulation to the evaluation of virtual enterprises. Each company or candidate can use a simulation of its facilities to determine i...
Jayendran Venkateswaran, Mohammed Yaseen Kalachika...
WER
2004
Springer
15 years 5 months ago
Evaluating Methodologies: A Requirements Engineering Approach Through the Use of an Exemplar
Systems development methodologies continue to be a central area of research in software engineering. As the nature of applications and systems usage move increasingly towards open ...
Luiz Marcio Cysneiros, Vera Werneck, Eric S. K. Yu