Developing and evaluating protocols and applications for mobile ad-hoc networks requires significant organisational effort when real mobile ad-hoc networks with several mobile te...
Michael Matthes, Holger Biehl, Michael Lauer, Oswa...
In this paper, we present a high fidelity and efficient emulation framework called TWINE, which combines the accuracy and realism of emulated and physical networks and the scala...
The design and development process of complex systems require an adequate methodology and efficient instrumental support in order to early detect and correct anomalies in the func...
Remote code-injection attacks are one of the most frequently used attacking vectors in computer security. To detect and analyze injected code (often called shellcode), some researc...
—A new application of the NN ensemble approach is presented. It is applied to NN emulations of model physics in complex numerical climate models, and aimed at improving the accur...
Michael S. Fox-Rabinovitz, Vladimir M. Krasnopolsk...