Sciweavers

521 search results - page 63 / 105
» Object location in realistic networks
Sort
View
IJSNET
2008
115views more  IJSNET 2008»
13 years 9 months ago
Event-driven sensor deployment using self-organizing maps
: Coverage is an important optimization objective in pre and post-deployment stage of a Wireless Sensor Network (WSN). In this paper, we address the issue of placing a finite set o...
Cris Koutsougeras, Yi Liu, Rong Zheng
CRITIS
2007
13 years 10 months ago
A Malware Detector Placement Game for Intrusion Detection
We propose and investigate a game-theoretic approach to the malware filtering and detector placement problem which arises in network security. Our main objective is to develop opt...
Stephan Schmidt, Tansu Alpcan, Sahin Albayrak, Tam...
EUROGRAPHICS
2010
Eurographics
13 years 10 months ago
Continuum Traffic Simulation
We present a novel method for the synthesis and animation of realistic traffic flows on large-scale road networks. Our technique is based on a continuum model of traffic flow we e...
Jason Sewall, David Wilkie, Paul Merrell, Ming C. ...
CORR
2010
Springer
116views Education» more  CORR 2010»
13 years 4 months ago
Simulating Cyber-Attacks for Fun and Profit
We introduce a new simulation platform called Insight, created to design and simulate cyber-attacks against large arbitrary target scenarios. Insight has surprisingly low hardware...
Ariel Futoransky, Fernando Miranda, José Ig...
INFOCOM
2009
IEEE
14 years 3 months ago
P2P Second Life: Experimental Validation Using Kad
: Applications such as Second Life require massive deployment of servers worldwide to support a large number of users. We investigate experimentally how Peer-to-Peer (P2P) communic...
Matteo Varvello, C. Diout, Ernst W. Biersack