Sciweavers

12131 search results - page 317 / 2427
» Introduction to Modeling and Simulation
Sort
View
ASIASIM
2004
Springer
15 years 9 months ago
A Scalable, Ordered Scenario-Based Network Security Simulator
A network security simulator becomes more useful for the study on the cyber incidents and their defense mechanisms, as cyber terrors have been increasingly popular. Until now, netw...
Joo Beom Yun, Eung Ki Park, Eul-Gyu Im, Hoh Peter ...
EURODAC
1994
IEEE
122views VHDL» more  EURODAC 1994»
15 years 8 months ago
Compiled-code-based simulation with timing verification
Due to the complexity of today's systems, prototyping by simulation must be based on simulation-engine-like performance. It is proved by implementations that compiler-driven ...
Winfried Hahn, Andreas Hagerer, C. Herrmann
CN
2006
106views more  CN 2006»
15 years 4 months ago
Efficient large-scale BGP simulations
Simulation has been the method of choice for analyzing large, complex, and highly volatile systems. One of these systems is the inter-domain routing infrastructure of the Internet...
Xenofontas A. Dimitropoulos, George F. Riley
MICCAI
2005
Springer
16 years 5 months ago
A Fast-Marching Approach to Cardiac Electrophysiology Simulation for XMR Interventional Imaging
Cardiac ablation procedures are becoming more routine to treat arrhythmias. The development of electrophysiological models will allow investigation of treatment strategies. However...
Maxime Sermesant, Yves Coudière, Valé...
DATE
2008
IEEE
122views Hardware» more  DATE 2008»
15 years 10 months ago
Simulation-Directed Invariant Mining for Software Verification
With the advance of SAT solvers, transforming a software program to a propositional formula has generated much interest for bounded model checking of software in recent years. How...
Xueqi Cheng, Michael S. Hsiao