Sciweavers

1414 search results - page 97 / 283
» Combining Intruder Theories
Sort
View
SCA
2007
15 years 3 months ago
A decision network framework for the behavioral animation of virtual humans
We introduce a framework for advanced behavioral animation in virtual humans, which addresses the challenging open problem of simulating social interactions between pedestrians in...
Qinxin Yu, Demetri Terzopoulos
90
Voted
MJ
2006
71views more  MJ 2006»
15 years 20 days ago
Reliability analysis of the fine pitch connection using anisotropic conductive film (ACF)
A novel method (the V-shaped curve) is presented to predict the failure probability of anisotropic conductive film (ACF) in IC/substrate assemblies. The Poisson function is used t...
Chao-Ming Lin, Win-Jin Chang, Te-Hua Fang
CORR
1999
Springer
70views Education» more  CORR 1999»
15 years 11 days ago
Restart Strategies and Internet Congestion
We recently presented a methodology to quantitatively reduce the average time and variance in the time required to execute electronic transactions in a network environment such as...
Sebastian M. Maurer, Bernardo A. Huberman
141
Voted
ER
2007
Springer
237views Database» more  ER 2007»
15 years 6 months ago
Business Process and Business Rule Modeling Languages for Compliance Management: A Representational Analysis
Organizations are under increasing scrutiny to document their compliance to regulatory requirements. To this end, they have to formally document their operating procedures to supp...
Michael zur Muehlen, Marta Indulska, Gerrit Kamp
98
Voted
JCT
1998
193views more  JCT 1998»
15 years 11 days ago
Fractional Kernels in Digraphs
The aim of this note is to point out some combinatorial applications of a lemma of Scarf, proved first in the context of game theory. The usefulness of the lemma in combinatorics...
Ron Aharoni, Ron Holzman