Sciweavers

353 search results - page 35 / 71
» The C Hackers Guide
Sort
View
IEEEARES
2009
IEEE
14 years 5 months ago
A Mobile Ambients-Based Approach for Network Attack Modelling and Simulation
Abstract—Attack Graphs are an important support for assessment and subsequent improvement of network security. They reveal possible paths an attacker can take to break through se...
Virginia N. L. Franqueira, Pascal van Eck, Roel Wi...
CEC
2009
IEEE
14 years 5 months ago
Towards creative design using collaborative interactive genetic algorithms
— We present a computational model of creative design based on collaborative interactive genetic algorithms. We test our model on floorplanning. We guide the evolution of floor...
Juan C. Quiroz, Sushil J. Louis, Amit Banerjee, Se...
MM
2009
ACM
163views Multimedia» more  MM 2009»
14 years 5 months ago
ISP-friendly peer selection in P2P networks
Peer-to-peer (P2P) multicast is a scalable solution adopted by many video streaming systems. However, a prevalence of P2P applications has caused heavy traffic on the Internet. W...
Zhijie Shen, Roger Zimmermann
SEMCO
2008
IEEE
14 years 5 months ago
TcruziKB: Enabling Complex Queries for Genomic Data Exploration
We developed a novel analytical environment to aid in the examination of the extensive amount of interconnected data available for genome projects. Our focus is to enable ity and ...
Pablo N. Mendes, Bobby McKnight, Amit P. Sheth, Je...
ICC
2007
IEEE
184views Communications» more  ICC 2007»
14 years 5 months ago
Resource-Aware and Link Quality Based Routing Metric for Wireless Sensor and Actor Networks
—This paper presents a resource-aware and link quality based (RLQ) routing metric to address energy limitations, link quality variations, and node heterogeneities in wireless sen...
Vehbi C. Gungor, Chellury Sastry, Zhen Song, Ryan ...