We are interested in the simulation and optimization of gas transport in networks. Those networks consist of pipes and various other components like compressor stations and valves...
Network intruders try to hide their identity by relaying their traf c through a number of intermediate hosts, called stepping stones. Network ow watermarks have been used to detec...
The increase of IEEE 802.11’s bandwidth led to a deployment of many multimedia applications over wireless networks. Nevertheless, these applications impose stringent constraints...
Abstract. In this paper, a novel virtual reality-based simulator for regional anaesthesia is presented. Individual datasets of patients with nerve cords are created from medical sc...
Sebastian Ullrich, Benedikt Fischer, Alexandre Nto...
This paper describes the integration of the Berkeley Architectural Walkthrough Program with the National Institute of Standards and Technology’s CFAST fire simulator. The integ...