139
click to vote
ASIASIM
15 years 2 months ago
2004 Springer
Abstract. Information security is a crucial technique for an organization to survive in these days. However, there is no integrated model to assess the security risk quantitatively...
101
click to vote
ASIASIM
15 years 2 months ago
2004 Springer
Abstract. Recently, flash memory is widely used in embedded applications since it has strong points: non-volatility, fast access speed, shock resistance, and low power consumption...
93
Voted
ASIASIM
15 years 2 months ago
2004 Springer
Abstract. Network security simulator is required for the study on the cyber intrusion and defense as cyber terrors have been increasingly popular. Until now, network security simul...
92
Voted
ASIASIM
15 years 2 months ago
2004 Springer
This paper presents an efficient self-collision detection algorithm for deformable body simulation using programmable graphics processing units (GPUs). The proposed approach store...
ASIASIM
15 years 2 months ago
2004 Springer
Geometric constraints are imperative components of many dynamic simulation systems to effectively control the behavior of simulated objects. In this paper we present an improved fi...
|