Results 11 - 20
of
172
C Concept Investigation via Air-Ground Simulation with Embedded Agents
"... analysis of interactions involving human operators and new automation tools. Research is exploring how air-ground simulations with embedded agents can complement human-in-theloop simulations for this purpose. This paper describes research toward integrating computational air traffic controller agent ..."
Abstract
- Add to MetaCart
agents into a large-scale distributed simulation in the Airspace Operations Laboratory (AOL) at NASA Ames Research Center. Before detailing the agent model and architecture and discussing simulation integration issues, the paper describes a methodology for using agents to understand human
SIMULATIONS FOR THE ENGINEERING OF LOGISTIC CONTROL SYSTEMS Die Anwendung neuer Simulationstechniken bei der
"... Summary (to be translated in German): Recent technological improvements have paved the road to extended use of simulation models in the area of logistic control systems design and implementation – e.g. automated container terminals, automated public transport with people movers, large scale undergro ..."
Abstract
- Add to MetaCart
underground freight transport or intelligent automated production in the automotive industry. Where traditionally simulations were used to answer what-if questions, these tools evolve towards realtime control systems in production environments. The evolutionary path contains a number of phases, which
An Investigation about the Simulation of IP Traceback and Various IP Traceback Strategies
, 2008
"... Distributed denial-of-service (DDoS) is a rapidly growing problem. The multitude and variety of both the attacks and the defense approaches is overwhelming. IP traceback – the ability to trace IP packets from source to destination – is a significant step toward identifying and, thus, stopping, attac ..."
Abstract
- Add to MetaCart
effects of different marking schemes in large-scale DDoS attacks. Based on the simulation and evaluation results, more efficient and effective algorithms, techniques and procedures to combat these attacks may be developed.
Towards a Computational Steering and Petri Nets Framework for the Modelling of Biochemical Reaction Networks
"... Abstract. Computational steering is an interactive remote control of a long running application. The user can adopt it, e.g., to adjust simulation parameters on the fly. Simulation of large-scale biochemical networks is often computationally expensive, particularly stochastic and hybrid simulation. ..."
Abstract
- Add to MetaCart
Abstract. Computational steering is an interactive remote control of a long running application. The user can adopt it, e.g., to adjust simulation parameters on the fly. Simulation of large-scale biochemical networks is often computationally expensive, particularly stochastic and hybrid simulation
Towards Virtual Mobility Support in a Federated Testbed for Wireless Sensor Networks
"... Abstract: We present a design that accommodates ‘virtual mobility ’ in a wireless sensor network testbed. Virtually-mobile nodes can be physical, simulated or emulated, and virtual mobility for all three types is treated uniformly by embedding the nodes in a virtual space. In operation, the traffic ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
of virtually-mobile nodes is intercepted and redirected to a mobility model from where it is selectively forwarded to other nodes that are virtually in range. We present a distributed implementation architecture that potentially allows the simulation/emulation of large-scale wireless sensor networks with large
Integration of Elastic and Streaming Traffic: A Fixed Point Approach
"... We present a fixed point approach to evaluate the quality of service parameters of elastic traffic multiplexed with streaming traffic in multi-service network. First, we handle elastic traffic and streaming traffic separately, and then we derive a general fixed point formulation integrating both typ ..."
Abstract
- Add to MetaCart
types of traffic in best effort networks. Then, we extend the application of this formulation to multi-service networks where priorities and bandwidth sharing schemes can be applied to different flows. Our approach is mainly oriented towards very large scale networks where traditional simulation
Network operations Network management
, 2015
"... a b s t r a c t Management and automated configuration of large-scale networks is one of the crucial issues for Internet Service Providers (ISPs). Since incorrect configurations may lead to loss of an enormous amount of customer traffic, highly experienced network administrators are typically the on ..."
Abstract
- Add to MetaCart
the ones who are trusted for the management and configuration of a running ISP network. In this paper, we present an online management and experimentation system with a “game ” interface to train network administrators and explore what-if scenarios without having to risk the large-scale network operation
Title: Linking activity-based travel demand models and traffic assignment: A Flemish case study Authors:
"... A custom agent-based simulation framework is developed that combines the fields of traffic demand modeling and traffic assignment, applied to the region of Flanders (Belgium). The framework uses an activity-based approach to model traffic demand and an assignment module that is linked to the traffic ..."
Abstract
- Add to MetaCart
to the traffic demand module. Activity data for the framework is provided by a large scale survey, conducted on 2500 households in the study area. The agent-based simulation model consists of over six million agents, one for each inhabitant, to represent the Flemish population. The simulation of the linked
ISRN SICS-D--56--SE Improving Low-Power Wireless Protocols with Timing-Accurate Simulation
, 2011
"... I first thank my thesis advisors Thiemo Voigt and Adam Dunkels for being my excellent advisors, and also for being the great colleagues you still are. Thiemo and Adam have complemented each other superbly, giving me feedback, perspectives, insights, and having made every single new venture truly fun ..."
Abstract
- Add to MetaCart
I first thank my thesis advisors Thiemo Voigt and Adam Dunkels for being my excellent advisors, and also for being the great colleagues you still are. Thiemo and Adam have complemented each other superbly, giving me feedback, perspectives, insights, and having made every single new venture truly fun. My deepest thanks also go to my professor Per Gunningberg, Uppsala University. Per has in a seemingly easy way spotted erroneous assumptions, has valued my research contributions, and has connected my own work with another broader world of research. I want to thank all colleagues in the Networked Embedded Systems group:
Society-centered design for socially embedded multiagent systems
- In CIA-04
, 2004
"... Abstract. To realize large-scale socially embedded multiagent systems, this paper proposes a new system design methodology towards society-centered design. We have already developed the scenario description language Q, which describes interaction protocols that link agents to society. Using the virt ..."
Abstract
-
Cited by 6 (2 self)
- Add to MetaCart
Abstract. To realize large-scale socially embedded multiagent systems, this paper proposes a new system design methodology towards society-centered design. We have already developed the scenario description language Q, which describes interaction protocols that link agents to society. Using
Results 11 - 20
of
172