Sciweavers

526 search results - page 35 / 106
» On the Number of Minimal Addition Chains
Sort
View
ICDCSW
2005
IEEE
15 years 3 months ago
Defending against Sybil Attacks in Sensor Networks
Sybil attack is a harmful threat to sensor networks, in which a malicious node illegally forges an unbounded number of identities to defeat redundancy mechanisms. Digital certifi...
Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng N...
3DPVT
2006
IEEE
188views Visualization» more  3DPVT 2006»
15 years 1 months ago
Statistical Inference of Biological Structure and Point Spread Functions in 3D Microscopy
We present a novel method for detecting and quantifying 3D structure in stacks of microscopic images captured at incremental focal lengths. We express the image data as stochastic...
Joseph Schlecht, Kobus Barnard, Barry Pryor
WSC
2007
15 years 1 days ago
Agent-based modeling and simulation: desktop ABMS
Agent-based modeling and simulation (ABMS) is a new approach to modeling systems comprised of autonomous, interacting agents. ABMS promises to have far-reaching effects on the way...
Charles M. Macal, Michael J. North
WSC
2008
15 years 1 days ago
Agent-based modeling and simulation: ABMS examples
Agent-based modeling and simulation (ABMS) is a new approach to modeling systems comprised of autonomous, interacting agents. ABMS promises to have far-reaching effects on the way...
Charles M. Macal, Michael J. North
WSC
1997
14 years 11 months ago
Panel on Transportation and Logistics Modeling
Transportation and logistics are fertile areas for modeling. Simulation has traditionally been used in warehousing and inside the distribution center or processing hub in the truc...
John S. Carson II, Mani S. Manivannan, Mark K. Bra...