Sciweavers

347 search results - page 57 / 70
» Development of Threat Evaluation Tool for Distributed Networ...
Sort
View
AAAI
1997
13 years 8 months ago
Intelligent Agents for the Synthetic Battlefield: A Company of Rotary Wing Aircraft
1 We have constructed a team of intelligent agents that perform the tasks of an attack helicopter company for a synthetic battlefield environment used for running largescale milita...
Randall W. Hill Jr., Johnny Chen, Jonathan Gratch,...
NSDI
2010
13 years 8 months ago
Mugshot: Deterministic Capture and Replay for JavaScript Applications
Mugshot is a system that captures every event in an executing JavaScript program, allowing developers to deterministically replay past executions of web applications. Replay is us...
James Mickens, Jeremy Elson, Jon Howell
ISF
2008
114views more  ISF 2008»
13 years 7 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
MM
2005
ACM
184views Multimedia» more  MM 2005»
14 years 27 days ago
A peer-to-peer network for live media streaming using a push-pull approach
In this paper, we present an unstructured peer-to-peer network called GridMedia for live media streaming employing a push-pull approach. Each node in GridMedia randomly selects it...
Meng Zhang, Jian-Guang Luo, Li Zhao, Shi-Qiang Yan...
VTC
2008
IEEE
137views Communications» more  VTC 2008»
14 years 1 months ago
A Multi-Hop Polling Service with Bandwidth Request Aggregation in IEEE 802.16j Networks
— The IEEE 802.16j protocol for a multi-hop relay (MMR) WiMAX network is being developed to increase data rates and extend service coverage as an enhancement of existing WiMAX st...
Chun Nie, Thanasis Korakis, Shivendra S. Panwar