Sciweavers

5234 search results - page 194 / 1047
» Simulation of Computer Network Attacks
Sort
View
ICPR
2000
IEEE
16 years 3 months ago
Remote Robot Execution through WWW Simulation
Nowadays, every industry's goal is to improve their manufacturingprocesses and to increase their cadence of production, in order to be competitive. This goal usually implies ...
Santiago T. Puente Méndez, Fernando Torres ...
JIFS
2007
42views more  JIFS 2007»
15 years 1 months ago
Simulation of contra-lateral inhibition using venn-networks
This paper illustrates how a computer model, based on Venn-networks, mimics a physiological phenomenon present in brains of higher animals: contra-lateral inhibition. The experimen...
Fernando Buarque de Lima Neto, Philippe De Wilde
PERCOM
2010
ACM
15 years 25 days ago
DogSim: A state chart simulator for Domotic Environments
—Smart Homes and Domotic Environments are promising to revolutionize the daily human life providing users with increased care, adaptability and safety. However, to fully exploit ...
Dario Bonino, Fulvio Corno
APNOMS
2009
Springer
15 years 9 months ago
A PKI Based Mesh Router Authentication Scheme to Protect from Malicious Node in Wireless Mesh Network
Wireless mesh network can increase service coverage by low-cost multiple-paths between a source and a destination. But because of the wireless nature, wireless mesh network is vuln...
Kwang Hyun Lee, Choong Seon Hong
SKG
2006
IEEE
15 years 8 months ago
Simulate Grid Resource Trading via Cognitive Agent: A Case Study
In this paper, we explore the market-based grid resource trading system from the social perspective and the collaborative computing perspective. We firstly introduce a novel fram...
Yuhui Qiu, Zhixing Huang