Sciweavers

405 search results - page 64 / 81
» Avatar-centric Risk Evaluation
Sort
View
TSMC
2002
102views more  TSMC 2002»
14 years 9 months ago
Modeling and analysis of air campaign resource allocation: a spatio-temporal decomposition approach
In this paper, we address the modeling and analysis issues associated with a generic theater level campaign where two adversaries pit their military resources against each other ov...
Debasish Ghose, M. Krichman, Jason L. Speyer, Jeff...
SAC
2008
ACM
14 years 9 months ago
Workflow management versus case handling: results from a controlled software experiment
Business Process Management (BPM) technology has become an important instrument for improving process performance. When considering its use, however, enterprises typically have to...
Bela Mutschler, Barbara Weber, Manfred Reichert
88
Voted
TITB
2008
97views more  TITB 2008»
14 years 9 months ago
A Novel Breast Tissue Density Classification Methodology
Abstract--It has been shown that the accuracy of mammographic abnormality detection methods is strongly dependent on the breast tissue characteristics, where a dense breast drastic...
Arnau Oliver, Jordi Freixenet, Robert Marti, Josep...
IEEECIT
2010
IEEE
14 years 8 months ago
Selective and Early Threat Detection in Large Networked Systems
—The complexity of modern networked information systems, as well as all the defense-in-depth best practices, require distributed intrusion detection architectures relying on the ...
Michele Colajanni, Mirco Marchetti, Michele Messor...
TEDU
2008
126views Education» more  TEDU 2008»
14 years 8 months ago
Online Learning and Clinical Procedures: Rapid Development and Effective Deployment of Game-Like Interactive Simulations
Abstract. Traditionally, medical education has used live patients to teach medical procedures. This carries a significant risk to patients. As learning technology advances, the ear...
Pablo Moreno-Ger, Carl Blesius, Paul Currier, Jos&...