121
click to vote
ANSS
15 years 6 months ago
2003 IEEE
: In this paper, we present and analyze three different algorithms for the evaluation of rare event simulation results. They are loosely based on the AAc method, which in turn is a...
101
click to vote
ANSS
15 years 6 months ago
2003 IEEE
In this work, we present a computational behavioral model for logic gates called Internode (Internal Node Logic Computational Model) that considers the functionality of the gate a...
120
click to vote
ANSS
15 years 6 months ago
2003 IEEE
Bluetooth is an emerging technology in wireless applications, and many related issues are yet to be explored both in academia and industry. Because of the complexity and the dynam...
120
click to vote
ANSS
15 years 6 months ago
2003 IEEE
The main goal of the NETSEC project is to design and implement a framework for mitigating the effects of the node-based and link-based DoS attacks. Our strategy employs three lin...
109
click to vote
ANSS
15 years 6 months ago
2003 IEEE
This paper presents a simulation performance improvement of the application of the Multicomponent Discrete Time System Specification (MultiDTSS) formalism to a fire spread. Multic...
|