Filters








46 Hits in 7.3 sec

MACE3J

Les Gasser, Kelvin Kakugawa
2002 Proceedings of the first international joint conference on Autonomous agents and multiagent systems part 2 - AAMAS '02  
to the pioneering MACE testbed.  ...  The MACE3J design is multi-grain, but gives special attention to simulating very large communities of large-grain agents.  ...  This work was partially supported under NSF grant 99-81797, by a grant of time on the SGI Origin multiprocessor from the National Center for Supercomputer Applications (NCSA) at the University of Illinois  ... 
doi:10.1145/544862.544918 dblp:conf/atal/GasserK02 fatcat:xccb6aof5fgjtgshkkfom3wily

MACE3J

Les Gasser, Kelvin Kakugawa
2002 Proceedings of the first international joint conference on Autonomous agents and multiagent systems part 2 - AAMAS '02  
to the pioneering MACE testbed.  ...  The MACE3J design is multi-grain, but gives special attention to simulating very large communities of large-grain agents.  ...  This work was partially supported under NSF grant 99-81797, by a grant of time on the SGI Origin multiprocessor from the National Center for Supercomputer Applications (NCSA) at the University of Illinois  ... 
doi:10.1145/544915.544918 fatcat:fietx6hrsjg6rbspyln6ealtn4

Farm: A Scalable Environment for Multi-agent Development and Evaluation [chapter]

Bryan Horling, Roger Mailler, Victor Lesser
2004 Lecture Notes in Computer Science  
In this paper we introduce Farm, a distributed simulation environment for simulating large-scale multi-agent systems.  ...  Farm uses a component-based architecture, allowing the researcher to easily modify and augment the simulation, as well as distribute the various pieces to spread the computational load and improve running  ...  This is not inter-agent shared memory, instead it provides an This type of mass data storage presents particular problems to our environment.  ... 
doi:10.1007/978-3-540-24625-1_13 fatcat:2ww2x4oaxfdhbpdqwr3cn4hd6u

Models, methods and middleware for grid-enabled multiphysics oil reservoir management

H. Klie, W. Bangerth, X. Gai, M. F. Wheeler, P. L. Stoffa, M. Sen, M. Parashar, U. Catalyurek, J. Saltz, T. Kurc
2006 Engineering with Computers  
The need to perform extensive reservoir studies for either uncertainty assessment or optimal exploitation plans brings up demands of computing power and data management in a more pervasive way.  ...  This work focuses on high performance numerical methods, tools and Grid-enabled middleware systems for scalable and data-driven computations for multiphysics simulation and decision-making processes in  ...  Acknowledgements The authors want to thank the National Science Foundation (NSF) for its support under the ITR grant EIA-0121523/ EIA-0120934, grants #-ACI-9619020 (UC Subcontract #10152408), #EIA-0121177  ... 
doi:10.1007/s00366-006-0035-9 fatcat:zy5obls3kvchxph56cl6vgtiia

Distributed Iterative CT Reconstruction using Multi-Agent Consensus Equilibrium [article]

Venkatesh Sridhar, Xiao Wang, Gregery T. Buzzard, Charles A. Bouman
2019 arXiv   pre-print
Finally, we validate our approach on a distributed memory system with real CT data.  ...  In this paper, we propose a multi-agent consensus equilibrium (MACE) algorithm for distributing both the computation and memory of MBIR reconstruction across a large number of parallel nodes.  ...  Further, DM methods ensure that the overhead incurred due to inter-node communication and synchronization does not dominate the computation.  ... 
arXiv:1911.09278v1 fatcat:5sdcibkukrexpprkcn47c22xcy

Tools for worm experimentation on the DETER testbed

Songjie Wei, Calvin Ko, Jelena Mirkovic, Alefiya Hussain
2009 2009 5th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities and Workshops  
strategies in local area networks.  ...  Worm experimentation is challenging for researchers today because of the lack of standardized tools to simulate and emulate worm spreads in a realistic setting.  ...  Worm scans sent to non-routable addresses or non-vulnerable hosts are dropped or processed only on the sender-side machine and thus do not increase inter-machine communication. C.  ... 
doi:10.1109/tridentcom.2009.4976194 dblp:conf/tridentcom/WeiKMH09 fatcat:w3nzvyo7ffhnzee7cxc6qez37m

Tools for worm experimentation on the DETER testbed

Songjie Wei, Alefiya Hussain, Jelena Mirkovic, Calvin Ko
2010 International Journal of Communication Networks and Distributed Systems  
strategies in local area networks.  ...  Worm experimentation is challenging for researchers today because of the lack of standardized tools to simulate and emulate worm spreads in a realistic setting.  ...  Worm scans sent to non-routable addresses or non-vulnerable hosts are dropped or processed only on the sender-side machine and thus do not increase inter-machine communication. C.  ... 
doi:10.1504/ijcnds.2010.033972 fatcat:nyw3ojqyajeklfs3skv6s3oj5q

Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card [chapter]

Helmut Scherzer, Ran Canetti, Paul A. Karger, Hugo Krawczyk, Tal Rabin, David C. Toll
2003 Lecture Notes in Computer Science  
Such a protocol is required to be part of the operating system, rather than the traditional smart card approach of allowing applications to do authentication, because strong authentication is essential  ...  for the operating system to protect one application from another.  ...  Finally, we thank the anonymous reviewers of the program committee and Yves Deswarte for their suggested improvements to the paper.  ... 
doi:10.1007/978-3-540-39650-5_11 fatcat:qhsdwewlsze6hpjnpzuvliy7kq

Software agents: an overview

Hyacinth S. Nwana
1996 Knowledge engineering review (Print)  
Next, it places agents in context, defines them and then goes on, inter alia, to overview critically the rationales, hypotheses, goals, challenges and state-of-the-art demonstrators of the various agent  ...  However, the overuse of the word 'agent' has tended to mask the fact that, in reality, there is a truly heterogeneous body of research being carried out under this banner.  ...  Acknowledgements We acknowledge Nader Azarmi for encouraging us to write this paper, particularly through his provision of a fraction of the literature referenced in it.  ... 
doi:10.1017/s026988890000789x fatcat:n7qem32mlfe2pmrfhnjfvkfsh4

Evaluation des systèmes de détection d'intrusions

-Anas -ABOU EL KALAM
2006 Revue de l Electricité et de l Electronique  
Another interesting work is MACE {Sommers04}. MACE is a toolkit for malicious traffic generation written in Python.  ...  Network carrier: Application Layer The worm payload is sent in a SQL Server Resolution Service request to the pseudo-random target address.  ...  Often, a series of experiments are performed on systems using a reference set of benchmarks (datasets/programs).  ... 
doi:10.3845/ree.2006.102 fatcat:erwecavq3zh33o3b5aemi5q5gm

Model Checking of Distributed Algorithm Implementations

Maysam Yabandeh
2010
A modern manycore architecture can be viewed as a distributed system with explicit message passing to communicate between cores.  ...  Those approaches reduce the problem of model checking distributed systems to that of centralized systems, by using the global state, which also includes the network state, as the model checking state.  ...  Now, to complete the proof, we need to show that the theory holds for k = 2. We can make it hold by an initialization process.  ... 
doi:10.5075/epfl-thesis-4858 fatcat:up6kw5bcjjdnvecscrllw2avyq

Security through isolation for cloud and mobile

Patrick Colp
2021
Sharing data between applications is crucial for mobile platforms and is achieved using inter-process communication (IPC).  ...  We explore security through isolation as a means to protect the sensitive data residing on cloud and mobile platforms.  ...  When I began my grad career, one of my supervisors, William (Bill) Aiello, was also head of the department at the time. I therefore worked mostly with Andrew (Andy) Warfield, my other supervisor.  ... 
doi:10.14288/1.0401793 fatcat:aofnehnz2jhbrd6vtfqy7qkcau

Deterministic systems analysis

Anton Burtsev
2013
Recap relies on a compiler support to generate inter position code for shared memory reads. Run-time library records results of the system calls, messages, and asynchronous signals.  ...  Instead, the Xen intervirtual machine communication is built on top of the Xen memory sharing primitives.  ... 
doi:10.26053/0h-3dyc-e0g0 fatcat:qxfcv6uferfatirluhbu2khkhe

Western Medical Research Conference 2019 (Formerly Western Regional Meeting) Camel, California, January 24–26 2019

2019 Journal of Investigative Medicine  
It would be cost effective and clinically beneficial to conduct allergy testing on low risk patients to reduce the number of individuals falsely-labeled with a penicillin allergy.  ...  Methods used Based on our study of 502 female patients, 157 reported a history of pregnancy.  ...  Last year, a participatory design approach was used to devise community generated, self-sustaining solutions to improve oral health.  ... 
doi:10.1136/jim-2018-000939.64 fatcat:cfvir6qxcfghjf6nzfbrgix54q

Maritime Archaeology: A Reader of Substantive and Theoretical Contributions.:Maritime Archaeology: A Reader of Substantive and Theoretical Contributions

Nick Winder
2000 American Anthropologist  
In contrast to the villagers, who share a common his- tory, settlers’ individual experiences of migration do not pro- vide a basis for collective memories of community.  ...  systems as one on science, pseudo-science, and pre-science.  ... 
doi:10.1525/aa.2000.102.4.911 fatcat:uxjhubut5rdddcopbaq7tumc6y
« Previous Showing results 1 — 15 out of 46 results