Many security and privacy protocols for RFID systems have been proposed [8, 13, 19, 20]. In most cases these protocols are evaluated in terms of security based on some model. Ofte...
"Spreadsheet simulation" refers to the use of a spreadsheet as a platform for representing simulation models and performing simulation experiments. This tutorial explain...
The modeling of computer systems, particularly distributed systems, is presented with an emphasis on the system characteristics that are important to the model and some general me...
We study the mixing time of some Markov Chains converging to critical physical models. These models are indexed by a parameter β and there exists some critical value βc where th...
Automatically extracting object models from images is a complex task. We describe research in extracting 3-D models of buildings from aerial images. This work has resulted in seve...