Sciweavers

5234 search results - page 163 / 1047
» Simulation of Computer Network Attacks
Sort
View
HPDC
1999
IEEE
14 years 2 months ago
The Cactus Computational Toolkit and using Distributed Computing to Collide Neutron Stars
We are developing a system for collaborative research and development for a distributed group of researchers at different institutions around the world. In a new paradigm for coll...
Gabrielle Allen, Tom Goodale, Joan Massó, E...
SCN
2008
Springer
147views Communications» more  SCN 2008»
13 years 9 months ago
Privacy-preserving secure relative localization in vehicular networks
Relative location information helps build vehicle topology maps. Such maps provide location information of nearby vehicles to drivers. In building a vehicle topology, one must cons...
Lei Tang, Xiaoyan Hong, Phillip G. Bradford
CAD
2005
Springer
13 years 9 months ago
Fidelity in visualizing large-scale simulations
Computer simulations are powerful tools frequently used today in many important applications, for example to build safer buildings, to crash-test an automobile before it is built,...
Voicu Popescu, Christoph M. Hoffmann
VISUALIZATION
2003
IEEE
14 years 2 months ago
Producing High Quality Visualizations of Large-Scale Simulations
This paper describes the work of a team of researchers in computer graphics, geometric computing, and civil engineering to produce a visualization of the September 2001 attack on ...
Voicu Popescu, Chris Hoffmann, Sami Kilic, Mete So...
CCR
2006
148views more  CCR 2006»
13 years 9 months ago
NetScale: scalable time-stepped hybrid simulation of large IP networks
This paper presents a scalable time-stepped hybrid simulation algorithm which is well adapted to the simulation of large IP networks (up to one million of competing flows and netw...
Laurent Fournié, Dohy Hong, Florent Perisse