Sciweavers

3555 search results - page 555 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
137
Voted
TRIDENTCOM
2005
IEEE
15 years 9 months ago
A Global X-Bone for Network Experiments
A global Internet overlay testbed is being deployed to support the distributed, shared use of resources for network research. The Global X-Bone (GX-Bone) augments the X-Bone softw...
Joseph D. Touch, Yu-Shun Wang, Venkata K. Pingali,...
VR
2000
IEEE
127views Virtual Reality» more  VR 2000»
15 years 8 months ago
Physically-based Manipulation on the Responsive Workbench
This paper describes how a physical simulation can be integrated with our Responsive Workbench system to support complex assembly tasks involving multiple hands and users. Our sys...
Bernd Fröhlich, Henrik Tramberend, Andrew C. ...
WSC
2004
15 years 5 months ago
Single-Threaded Specification of Process-Interaction Formalism in Java
In order to support the conceptualization and specification of simulation models of complex systems, several formalisms or world views exist. Petri nets, differential equations, d...
Peter H. M. Jacobs, Alexander Verbraeck
BIOSTEC
2008
137views Healthcare» more  BIOSTEC 2008»
15 years 5 months ago
Breast Contour Detection with Stable Paths
Abstract. Breast cancer conservative treatment (BCCT), due to its proven oncological safety, is considered, when feasible, the gold standard of breast cancer treatment. However, ae...
Jaime S. Cardoso, Ricardo Sousa, Luís Filip...
EURONGI
2004
Springer
15 years 9 months ago
Admission Control in the Downlink of WCDMA/UMTS
In this paper, we develop a novel CAC algorithm that takes into account the mobility of users inside the cell with a focus on the downlink of third generation mobile systems. We ï¬...
Salah-Eddine Elayoubi, Tijani Chahed