Sciweavers

3979 search results - page 24 / 796
» Wild control operators
Sort
View
COR
2008
86views more  COR 2008»
15 years 14 days ago
Optimizing counter-terror operations: Should one fight fire with "fire" or "water"?
This paper deals dynamically with the question of how recruitment to terror organizations is influenced by counter-terror operations. This is done within a optimal control model, ...
Jonathan P. Caulkins, Dieter Grass, Gustav Feichti...
87
Voted
VLSID
2002
IEEE
116views VLSI» more  VLSID 2002»
16 years 2 months ago
Register Transfer Operation Analysis during Data Path Verification
A control part ? data path partition based sequential circuit verification scheme aimed at avoiding state explosion comprises two major modules namely, a data path verifier and a ...
D. Sarkar
116
Voted
ICC
2007
IEEE
15 years 8 months ago
On the Risk-Based Operation of Mobile Attacks in Wireless Ad Hoc Networks
—In this paper we study the propagation of malicious software in wireless ad hoc networks under a probabilistic framework. We design topology control algorithms for the developme...
Vasileios Karyotis, Symeon Papavassiliou, Mary Gra...
95
Voted
WSCG
2001
108views more  WSCG 2001»
15 years 3 months ago
Co-Operative and Concurrent Blending Motion Generators
In this paper we will be describing a new animation architecture and its implementation in our system LIVE. This model introduces a new blending layer approach which uses several ...
Vincent Bonnafous, Eric Menou, Jean-Pierre Jessel,...
PERVASIVE
2007
Springer
15 years 8 months ago
Operating Appliances with Mobile Phones - Strengths and Limits of a Universal Interaction Device
Abstract. Mobile phones are increasingly becoming ubiquitous computational devices that are almost always available, individually adaptable, and nearly universally connectable (usi...
Christof Roduner, Marc Langheinrich, Christian Flo...