For over 3 decades, computer graphics technology has been developed to simulate physically accurate image of real scene. Meanwhile, useful tone mapping methods have been developed...
In this paper, we study the problem of testing Intrusion Detection Systems (IDS) in Mobile Ad hoc Networks (MANET). Testing is achieved by simulating different measurements. We mo...
Hadi Otrok, Joey Paquet, Mourad Debbabi, Prabir Bh...
Despite the extensive use of the agent technology in the Supply Chain Management field, its integration with Advanced Planning and Scheduling (APS) tools still represents a promis...
Luis Antonio de Santa-Eulalia, Sophie D'Amours, Je...
In this paper we are concerned with innovation in the development of mobile applications. In particular, we address how we may come to think systematically about innovative aspects...
Jens Henrik Hosbond, Peter Axel Nielsen, Ivan Aaen
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. The quality of protection provided by a firewall directly...