162
click to vote
ASIASIM
15 years 5 months ago
2004 Springer
Abstract. Information security is a crucial technique for an organization to survive in these days. However, there is no integrated model to assess the security risk quantitatively...
151
click to vote
WSC
15 years 1 months ago
2004
This paper discusses a two-step virtual reality based conceptual design tool that enables industrial designers to create sketches of their ideas in 3-dimensional space in real tim...
143
click to vote
ISMS
15 years 5 months ago
2004 Springer
Advancements in robotics have led to significant improvements in robot-assisted minimally invasive surgery. The use of these robotic systems has improved surgeon dexterity, reduced...
131
click to vote
MSWIM
15 years 5 months ago
2004 ACM
In this paper we discuss utility functions models to study Radio Resource Management. Our goal is to identify the characteristics of the wireless systems which make such theoretic...
130
click to vote
MASCOTS
15 years 1 months ago
2004
This paper presents experimental measurements of TCP bulk data transfer performance in a multi-hop wireless ad hoc network environment. The first part of the paper studies how TCP...
|