Sciweavers

5234 search results - page 168 / 1047
» Simulation of Computer Network Attacks
Sort
View
IPSN
2005
Springer
14 years 3 months ago
Robust computation of aggregates in wireless sensor networks: distributed randomized algorithms and analysis
A wireless sensor network consists of a large number of small, resource-constrained devices and usually operates in hostile environments that are prone to link and node failures. ...
Jen-Yeu Chen, Gopal Pandurangan, Dongyan Xu
COLCOM
2005
IEEE
14 years 3 months ago
Distributed floor control protocols for computer collaborative applications on overlay networks
— Computer supported collaborative applications on overlay networks are gaining popularity among users who are geographically dispersed. Examples of these kinds of applications i...
Shankar M. Banik, Sridhar Radhakrishnan, Tao Zheng...
PERVASIVE
2009
Springer
14 years 4 months ago
Realistic Driving Trips For Location Privacy
Simulated, false location reports can be an effective way to confuse a privacy attacker. When a mobile user must transmit his or her location to a central server, these location re...
John Krumm
JVA
2006
IEEE
14 years 3 months ago
Simulated Annealing for Grid Scheduling Problem
Grid computing is a form of distributed computing that involves coordinating and sharing computing, application, data storage or network resources across dynamic and geographicall...
Stefka Fidanova
EUROGRAPHICS
2010
Eurographics
13 years 10 months ago
Continuum Traffic Simulation
We present a novel method for the synthesis and animation of realistic traffic flows on large-scale road networks. Our technique is based on a continuum model of traffic flow we e...
Jason Sewall, David Wilkie, Paul Merrell, Ming C. ...