Sciweavers

2429 search results - page 282 / 486
» Using Aspects to Design a Secure System
Sort
View
DSN
2000
IEEE
15 years 7 months ago
A Low Latency, Loss Tolerant Architecture and Protocol for Wide Area Group Communication
Group communication systems are proven tools upon which to build fault-tolerant systems. As the demands for fault-tolerance increase and more applications require reliable distrib...
Yair Amir, Claudiu Danilov, Jonathan Robert Stanto...
EVOW
2009
Springer
15 years 10 months ago
Evolving Simple Art-Based Games
Evolutionary art has a long and distinguished history, and genetic programming is one of only a handful of AI techniques which is used in graphic design and the visual arts. A rece...
Simon Colton, Cameron Browne
APNOMS
2009
Springer
15 years 9 months ago
IP Prefix Hijacking Detection Using Idle Scan
The Internet is comprised of a lot of interconnected networks communicating reachability information using BGP. Due to the design based on trust between networks, IP prefix hijacki...
Seong-Cheol Hong, Hong-Taek Ju, James W. Hong
USENIX
1994
15 years 4 months ago
Probing TCP Implementations
In this paper, we demonstrate a technique called active probing used to study TCP implementations. Active probing treats a TCP implementation as a black box, and uses a set of pro...
Douglas Comer, John C. Lin
AIMSA
2008
Springer
15 years 9 months ago
The Agent Modeling Language (AMOLA)
This paper presents the Agent MOdeling LAnguage (AMOLA). This language provides the syntax and semantics for creating models of multi-agent systems covering the analysis and design...
Nikolaos I. Spanoudakis, Pavlos Moraitis