Sciweavers

5234 search results - page 1009 / 1047
» Simulation of Computer Network Attacks
Sort
View
ATAL
2010
Springer
15 years 3 months ago
UAV swarm coordination using cooperative control for establishing a wireless communications backbone
In this paper, we present a mechanism to fly a swarm of UAVs with the aim of establishing a wireless backbone over a pre-specified area. The backbone is aimed at connecting interm...
Achudhan Sivakumar, Colin Keng-Yan Tan
GECCO
2008
Springer
158views Optimization» more  GECCO 2008»
15 years 3 months ago
Structure and parameter estimation for cell systems biology models
In this work we present a new methodology for structure and parameter estimation in cell systems biology modelling. Our modelling framework is based on P systems, an unconl comput...
Francisco José Romero-Campero, Hongqing Cao...
JCP
2006
100views more  JCP 2006»
15 years 2 months ago
A Local Enumeration Protocol in Spite of Corrupted Data
We present a novel self-stabilizing version of Mazurkiewicz enumeration algorithm [1]. The initial version is based on local rules to enumerate nodes on an anonymous network. [2] p...
Brahim Hamid, Mohamed Mosbah
153
Voted
DPD
2007
165views more  DPD 2007»
15 years 2 months ago
Context-based caching and routing for P2P web service discovery
In modern heterogeneous environments, such as mobile, pervasive and ad-hoc networks, architectures based on web services offer an attractive solution for effective communication a...
Christos Doulkeridis, Vassilis Zafeiris, Kjetil N&...
JPDC
2006
175views more  JPDC 2006»
15 years 2 months ago
Stochastic modeling and analysis of hybrid mobility in reconfigurable distributed virtual machines
Virtualization provides a vehicle to manage the available resources and enhance their utilization in network computing. System dynamics requires virtual machines be distributed an...
Song Fu, Cheng-Zhong Xu
« Prev « First page 1009 / 1047 Last » Next »