Cyber security methods are continually being developed. To test these methods many organizations utilize both virtual and physical networks which can be costly and time consuming....
Michael E. Kuhl, Jason Kistner, Kevin Costantini, ...
This paper discusses information fusion methodologies, selection of one of these methodologies, and application of these fusion methodologies to underwater sonar simulation. Bayes...
Yanshen Zhu, Maria Bull, Haluk M. Akin, José...
acement of Crime (extended abstract) Tibor Bosse and Charlotte Gerritsen and Mark Hoogendoorn and S. Waqar Jaffry and Jan Treur1 Within Criminology, the process of crime displaceme...
Tibor Bosse, Charlotte Gerritsen, Mark Hoogendoorn...
We present a novel method to measure saliency in molecular dynamics simulation data. This saliency measure is based on a multiscale center-surround mechanism, which is fast and ef...
A method for automatically improving the performance of construction operations was developed by the integration of computer simulation and belief networks. The simulation model i...