Sciweavers

1276 search results - page 229 / 256
» A Model of Interaction for CVEs Based on the Model of Human ...
Sort
View
P2P
2007
IEEE
165views Communications» more  P2P 2007»
14 years 1 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
ROBOCUP
2004
Springer
118views Robotics» more  ROBOCUP 2004»
14 years 23 days ago
Approaching Urban Disaster Reality: The ResQ Firesimulator
The RoboCupRescue Simulation project aims at simulating large-scale disasters in order to explore coordination strategies helpful for real-life rescue missions. This can only be ac...
Timo A. Nüssle, Alexander Kleiner, Michael Br...
HICSS
1996
IEEE
165views Biometrics» more  HICSS 1996»
13 years 11 months ago
Advanced Distributed Simulation through the Aggregate Level Simulation Protocol
The venerable problem solving technique of simulation finds itself inthe midstof a revolution. Where once it was regarded as a "technique of last resort" for systems ana...
Richard M. Weatherly, Annette L. Wilson, Bradford ...
POPL
1990
ACM
13 years 11 months ago
Concurrent Constraint Programming
Abstract. Concurrent constraint programming is a simple but powerful framework for computation based on four basic computational ideas: concurrency (multiple agents are simultaneou...
Vijay A. Saraswat, Martin C. Rinard
USS
2008
13 years 9 months ago
Multi-flow Attacks Against Network Flow Watermarking Schemes
We analyze several recent schemes for watermarking network flows based on splitting the flow into intervals. We show that this approach creates time dependent correlations that en...
Negar Kiyavash, Amir Houmansadr, Nikita Borisov