Sciweavers

3605 search results - page 585 / 721
» System and simulation modeling using SysML
Sort
View
SUTC
2006
IEEE
15 years 9 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
112
Voted
CONTEXT
2003
Springer
15 years 8 months ago
On the Difference between Bridge Rules and Lifting Axioms
Abstract. In a previous paper, we proposed a first formal and conceptual comparison between the two most important formalizations of context in AI: Propositional Logic of Context ...
Paolo Bouquet, Luciano Serafini
132
Voted
VRML
1997
ACM
15 years 7 months ago
V-COLLIDE: Accelerated Collision Detection for VRML
Collision detection is essential for many applications involving simulation, behavior and animation. However, it has been regarded as a computationallydemanding task and is often ...
Thomas C. Hudson, Ming C. Lin, Jonathan D. Cohen, ...
144
Voted
INFFUS
2007
107views more  INFFUS 2007»
15 years 3 months ago
An information fusion demonstrator for tactical intelligence processing in network-based defense
The Swedish Defence Research Agency (FOI) has developed a concept demonstrator called the Information Fusion Demonstrator 2003 (IFD03) for demonstrating information fusion methodo...
Simon Ahlberg, Pontus Hörling, Katarina Johan...
114
Voted
SRDS
2007
IEEE
15 years 9 months ago
An Analytical Framework and Its Applications for Studying Brick Storage Reliability
The reliability of a large-scale storage system is influenced by a complex set of inter-dependent factors. This paper presents a comprehensive and extensible analytical framework ...
Ming Chen, Wei Chen, Likun Liu, Zheng Zhang