Sciweavers

3979 search results - page 24 / 796
» Wild control operators
Sort
View
75
Voted
COR
2008
86views more  COR 2008»
14 years 8 months ago
Optimizing counter-terror operations: Should one fight fire with "fire" or "water"?
This paper deals dynamically with the question of how recruitment to terror organizations is influenced by counter-terror operations. This is done within a optimal control model, ...
Jonathan P. Caulkins, Dieter Grass, Gustav Feichti...
66
Voted
VLSID
2002
IEEE
116views VLSI» more  VLSID 2002»
15 years 10 months ago
Register Transfer Operation Analysis during Data Path Verification
A control part ? data path partition based sequential circuit verification scheme aimed at avoiding state explosion comprises two major modules namely, a data path verifier and a ...
D. Sarkar
ICC
2007
IEEE
15 years 4 months ago
On the Risk-Based Operation of Mobile Attacks in Wireless Ad Hoc Networks
—In this paper we study the propagation of malicious software in wireless ad hoc networks under a probabilistic framework. We design topology control algorithms for the developme...
Vasileios Karyotis, Symeon Papavassiliou, Mary Gra...
WSCG
2001
108views more  WSCG 2001»
14 years 11 months ago
Co-Operative and Concurrent Blending Motion Generators
In this paper we will be describing a new animation architecture and its implementation in our system LIVE. This model introduces a new blending layer approach which uses several ...
Vincent Bonnafous, Eric Menou, Jean-Pierre Jessel,...
95
Voted
PERVASIVE
2007
Springer
15 years 3 months ago
Operating Appliances with Mobile Phones - Strengths and Limits of a Universal Interaction Device
Abstract. Mobile phones are increasingly becoming ubiquitous computational devices that are almost always available, individually adaptable, and nearly universally connectable (usi...
Christof Roduner, Marc Langheinrich, Christian Flo...