145
click to vote
ASIASIM
15 years 3 months ago
2004 Springer
Abstract. Information security is a crucial technique for an organization to survive in these days. However, there is no integrated model to assess the security risk quantitatively...
135
click to vote
WSC
14 years 11 months ago
2004
This paper discusses a two-step virtual reality based conceptual design tool that enables industrial designers to create sketches of their ideas in 3-dimensional space in real tim...
124
click to vote
ISMS
15 years 3 months ago
2004 Springer
Advancements in robotics have led to significant improvements in robot-assisted minimally invasive surgery. The use of these robotic systems has improved surgeon dexterity, reduced...
117
click to vote
WSC
14 years 11 months ago
2004
We consider the problem of estimating the small probability that a function of a finite number of random variables exceeds a large threshold. Each input random variable may be lig...
115
click to vote
MSWIM
15 years 3 months ago
2004 ACM
In this paper we discuss utility functions models to study Radio Resource Management. Our goal is to identify the characteristics of the wireless systems which make such theoretic...
|