Sciweavers

4346 search results - page 163 / 870
» Models of Complex Physical Systems Using Cell-DEVS
Sort
View
145
Voted
WSC
2007
15 years 6 months ago
Cyber attack modeling and simulation for network security analysis
Cyber security methods are continually being developed. To test these methods many organizations utilize both virtual and physical networks which can be costly and time consuming....
Michael E. Kuhl, Jason Kistner, Kevin Costantini, ...
IROS
2008
IEEE
113views Robotics» more  IROS 2008»
15 years 10 months ago
Motion recognition and generation by combining reference-point-dependent probabilistic models
— This paper presents a method to recognize and generate sequential motions for object manipulation such as placing one object on another or rotating it. Motions are learned usin...
Komei Sugiura, Naoto Iwahashi
127
Voted
MICRO
2008
IEEE
137views Hardware» more  MICRO 2008»
15 years 3 months ago
Verification of chip multiprocessor memory systems using a relaxed scoreboard
Verification of chip multiprocessor memory systems remains challenging. While formal methods have been used to validate protocols, simulation is still the dominant method used to ...
Ofer Shacham, Megan Wachs, Alex Solomatnikov, Amin...
IJCBDD
2010
127views more  IJCBDD 2010»
15 years 2 months ago
Predicting protein complexes by data integration of different types of interactions
: The explosion of highthroughput interaction data from proteomics studies gives us the opportunity to integrate Protein-Protein Interactions (PPI) from different type of interacti...
Powell Patrick Cheng Tan, Daryanaz Dargahi, Freder...
CSI
2007
86views more  CSI 2007»
15 years 3 months ago
Using UML to model relational database operations
The Unified Modeling Language (UML) is being used as the de-facto standard in the software industry. With the adoption of UML 2.0, the new enhancements allow this version to desc...
Eunjee Song, Shuxin Yin, Indrakshi Ray