Sciweavers

405 search results - page 45 / 81
» Avatar-centric Risk Evaluation
Sort
View
DSOM
2006
Springer
15 years 1 months ago
Detecting Bottleneck in n-Tier IT Applications Through Analysis
As the complexity of large-scale enterprise applications increases, providing performance verification through staging becomes an important part of reducing business risks associat...
Gueyoung Jung, Galen S. Swint, Jason Parekh, Calto...
ACIIDS
2010
IEEE
171views Database» more  ACIIDS 2010»
15 years 6 days ago
Evolving Concurrent Petri Net Models of Epistasis
Abstract. A genetic algorithm is used to learn a non-deterministic Petri netbased model of non-linear gene interactions, or statistical epistasis. Petri nets are computational mode...
Michael Mayo, Lorenzo Beretta
WSC
2007
15 years 2 days ago
Allocation of resources for hospital evacuations via simulation
Department of Health and Environmental Control (DHEC) issued an order recently requiring that all hospitals have an evacuation plan with the following components: sheltering plan,...
Esengul Tayfur, Kevin Taaffe
WSC
2007
15 years 2 days ago
Sensitivity estimates from characteristic functions
We investigate the application of the likelihood ratio method (LRM) for sensitivity estimation when the relevant density for the underlying model is known only through its charact...
Paul Glasserman, Zongjian Liu
WSC
2008
15 years 2 days ago
Analyzing dispensing plan for emergency medical supplies in the event of bioterrorism
To prepare for the event of bioterrorism, which could spread contagious disease such as anthrax, plague, smallpox, or tularemia to public, local governments in the United States a...
Young M. Lee