Sciweavers

3319 search results - page 658 / 664
» The topology of dark networks
Sort
View
SP
2000
IEEE
134views Security Privacy» more  SP 2000»
14 years 2 months ago
Fang: A Firewall Analysis Engine
Today, even a moderately sized corporate intranet contains multiple firewalls and routers, which are all used to enforce various aspects of the global corporate security policy. ...
Alain J. Mayer, Avishai Wool, Elisha Ziskind
SIGCOMM
1999
ACM
14 years 2 months ago
A Simple Approximation to Minimum-Delay Routing
The conventional approach to routing in computer networks consists of using a heuristic to compute a single shortest path from a source to a destination. Single-path routing is ve...
Srinivas Vutukury, J. J. Garcia-Luna-Aceves
HPCN
1999
Springer
14 years 2 months ago
GeoFEM: High Performance Parallel FEM for Solid Earth
hima and I. Fujishiro, "Measuring volumetric coherence," In ACM SIGGRAPH98 Conference Abstracts and Applications, p.260, July 1998. 1999 K.Garatani, H.Nakamura, H.Okuda a...
Kazuteru Garatani, Hisashi Nakamura, Hiroshi Okuda...
VRML
1998
ACM
14 years 2 months ago
The Peloton Bicycling Simulator
Peloton is a sports simulator that uses the Virtual Reality Modeling Language (VRML) to create virtual environments for athletic training and competition. In particular, it create...
Gianpaolo U. Carraro, Mauricio Cortes, John T. Edm...
ATAL
2008
Springer
13 years 11 months ago
Sensing-based shape formation on modular multi-robot systems: a theoretical study
This paper presents a theoretical study of decentralized control for sensing-based shape formation on modular multirobot systems, where the desired shape is specified in terms of ...
Chih-Han Yu, Radhika Nagpal