Sciweavers

WSC
2007
13 years 6 months ago
A supply chain paradigm to model business pprocesses at the Y-12 National Security Complex
The NNSA’s Y-12 National Security Complex is a manufacturing facility operated by BWXT Y-12. Y-12’s missions include ensuring the US’ nuclear weapons deterrent, storing nucl...
Reid L. Kress, Jack Dixon, Thomas M. Insalaco, Ric...
WSC
2007
13 years 6 months ago
Emergency departments nurse allocation to face a pandemic influenza outbreak
This study proposes a nurse allocation policy to manage patient overflow during a pandemic influenza outbreak. The objective is to minimize the number of patients waiting in queue...
Florentino Rico, Ehsan Salari, Grisselle Centeno
WSC
2007
13 years 6 months ago
Upgraded cellular automata based group-work interaction simulation
The simulation of group-work interaction is significant for Chinese enterprise organizational management. As a result, a cellular-automata based simulation model is put forward. T...
Dong Shengping, Hu Bin
WSC
2007
13 years 6 months ago
A simulation model with a low level of detail for container terminals and its applications
As trade among countries grows, the performance of container terminals is becoming more important than ever. In this paper, we present a 3D real-time-visualization containertermin...
Byung-Hyun Ha, Eun-Jung Park, Chan-Hee Lee
WSC
2007
13 years 6 months ago
Alternative thread scoring methods in qualitative event graphs
Event Graphs (EGs) and Simulation Graph Models provide a powerful and general modeling framework for discrete event simulation. Qualitative Event Graphs (QEGs) extend the EG frame...
Ricki G. Ingalls, Douglas J. Morrice
WSC
2007
13 years 6 months ago
Partial cross training in call centers with uncertain arrivals and global service level agreements
Inbound call center operations are challenging to manage; there is considerable uncertainty in estimates of arrival rates, and the operation is often subject to strict service lev...
Thomas R. Robbins, Terry P. Harrison, Deborah J. M...
WSC
2007
13 years 6 months ago
Statistical analysis of simulation output: state of the art
This paper reviews statistical methods for analyzing output data from computer simulations. Specifically, it focuses on the estimation of steady-state system parameters. The esti...
Christos Alexopoulos
WSC
2007
13 years 6 months ago
An elliptical cryptographic algorithm for RF wireless devices
In this paper, we propose a new asymmetric cryptographic algorithm (HOOD CRYPT) based on the Elliptical Curve Cryptographic approach. The algorithm describes how an orthogonal fre...
Robert Steven Owor, Khalil Dajani, Zephyrinus Okon...
WSC
2007
13 years 6 months ago
Towards a framework for healthcare simulation
The changing needs of healthcare provision around the world are forcing service designers and decision makers to adopt new tools in design and evaluation of processes. Apart from ...
Tillal Eldabi, Terry Young