Sciweavers

5234 search results - page 974 / 1047
» Simulation of Computer Network Attacks
Sort
View
122
Voted
EUC
2004
Springer
15 years 6 months ago
An Improved Handoff Technique for a Seamless Multimedia Services
Servicing mobile hosts over the Internet has some problems including nodes' location, independent addressing, address conversion and packet forwarding as well as mobile host&#...
Seung-Won Lee, Hyeon-Ok Hong, Seong-Ho Park, Yong ...
121
Voted
CONCUR
2006
Springer
15 years 6 months ago
Modeling Timed Concurrent Systems
Timed concurrent systems are widely used in concurrent and distributed real-time software, modeling of hybrid systems, design of hardware systems (using hardware description langua...
Xiaojun Liu, Eleftherios Matsikoudis, Edward A. Le...
142
Voted
DEBS
2010
ACM
15 years 6 months ago
Magnet: practical subscription clustering for Internet-scale publish/subscribe
An effective means for building Internet-scale distributed applications, and in particular those involving group-based information sharing, is to deploy peer-to-peer overlay netwo...
Sarunas Girdzijauskas, Gregory Chockler, Ymir Vigf...
153
Voted
DEBS
2010
ACM
15 years 5 months ago
Complex event processing synergies with predictive analytics
For Complex Event Processing (CEP), the synergy with Predictive Analytics (PA) is a promising research direction. In this paper we focus on the inclusion of PA technologies into C...
Gabriella Toth, Lajos Jeno Fülöp, L&aacu...
234
Voted
CIBCB
2007
IEEE
15 years 4 months ago
Optimization of Bacterial Strains with Variable-Sized Evolutionary Algorithms
—In metabolic engineering it is difficult to identify which set of genetic manipulations will result in a microbial strain that achieves a desired production goal, due to the co...
Miguel Rocha, José P. Pinto, Isabel Rocha, ...