Abstract—Attack Graphs are an important support for assessment and subsequent improvement of network security. They reveal possible paths an attacker can take to break through se...
Virginia N. L. Franqueira, Pascal van Eck, Roel Wi...
— We present a computational model of creative design based on collaborative interactive genetic algorithms. We test our model on floorplanning. We guide the evolution of floor...
Juan C. Quiroz, Sushil J. Louis, Amit Banerjee, Se...
Peer-to-peer (P2P) multicast is a scalable solution adopted by many video streaming systems. However, a prevalence of P2P applications has caused heavy traffic on the Internet. W...
We developed a novel analytical environment to aid in the examination of the extensive amount of interconnected data available for genome projects. Our focus is to enable ity and ...
Pablo N. Mendes, Bobby McKnight, Amit P. Sheth, Je...
—This paper presents a resource-aware and link quality based (RLQ) routing metric to address energy limitations, link quality variations, and node heterogeneities in wireless sen...
Vehbi C. Gungor, Chellury Sastry, Zhen Song, Ryan ...