Sciweavers

ASIASIM
2004
Springer
15 years 5 months ago
A Security Risk Analysis Model for Information Systems
Abstract. Information security is a crucial technique for an organization to survive in these days. However, there is no integrated model to assess the security risk quantitatively...
Hoh Peter In, Young-Gab Kim, Taek Lee, Chang-Joo M...
WSC
2004
15 years 1 months ago
Two-Step 3-Dimensional Sketching Tool for New Product Development
This paper discusses a two-step virtual reality based conceptual design tool that enables industrial designers to create sketches of their ideas in 3-dimensional space in real tim...
Ali Akgunduz, Hang Yu
ISMS
2004
Springer
15 years 5 months ago
Design, Development, and Testing of an Automated Laparoscopic Grasper with 3-D Force Measurement Capability
Advancements in robotics have led to significant improvements in robot-assisted minimally invasive surgery. The use of these robotic systems has improved surgeon dexterity, reduced...
Gregory Tholey, Anand Pillarisetti, William Green,...
MSWIM
2004
ACM
15 years 5 months ago
On utility-based radio resource management with and without service guarantees
In this paper we discuss utility functions models to study Radio Resource Management. Our goal is to identify the characteristics of the wireless systems which make such theoretic...
Leonardo Badia, Michele Zorzi
MASCOTS
2004
15 years 1 months ago
Experimental Evaluation of TCP Performance in Multi-Hop Wireless Ad Hoc Networks
This paper presents experimental measurements of TCP bulk data transfer performance in a multi-hop wireless ad hoc network environment. The first part of the paper studies how TCP...
Abhinav Gupta, Ian Wormsbecker, Carey L. Williamso...
Modeling and Simulation
Top of PageReset Settings