Sciweavers

5234 search results - page 132 / 1047
» Simulation of Computer Network Attacks
Sort
View
MIG
2009
Springer
14 years 3 months ago
Evolved Controllers for Simulated Locomotion
Abstract. We present a system for automatically evolving neural networks as physics-based locomotion controllers for humanoid characters. Our approach provides two key features: (a...
Brian F. Allen, Petros Faloutsos
NC
2011
219views Neural Networks» more  NC 2011»
13 years 5 days ago
Complexity-preserving simulations among three variants of accepting networks of evolutionary processors
In this paper we consider three variants of accepting networks of evolutionary processors. It is known that two of them are equivalent to Turing machines. We propose here a direct ...
Paolo Bottoni, Anna Labella, Florin Manea, Victor ...
DCOSS
2009
Springer
14 years 3 months ago
LazySync: A New Synchronization Scheme for Distributed Simulation of Sensor Networks
To meet the demands for high simulation fidelity and speed, parallel and distributed simulation techniques are widely used in building wireless sensor network simulators. However,...
Zhong-Yi Jin, Rajesh Gupta
DIMVA
2007
13 years 10 months ago
Distributed Evasive Scan Techniques and Countermeasures
Scan detection and suppression methods are an important means for preventing the disclosure of network information to attackers. However, despite the importance of limiting the inf...
Min Gyung Kang, Juan Caballero, Dawn Xiaodong Song
TWC
2008
138views more  TWC 2008»
13 years 9 months ago
LKE: A Self-Configuring Scheme for Location-Aware Key Establishment in Wireless Sensor Networks
Symmetric key agreement is significant to security provisioning in sensor networks with resource limitations. A number of pairwise key pre-distribution protocols have been proposed...
Fang Liu, Xiuzhen Cheng