This paper deals dynamically with the question of how recruitment to terror organizations is influenced by counter-terror operations. This is done within a optimal control model, ...
Jonathan P. Caulkins, Dieter Grass, Gustav Feichti...
A control part ? data path partition based sequential circuit verification scheme aimed at avoiding state explosion comprises two major modules namely, a data path verifier and a ...
—In this paper we study the propagation of malicious software in wireless ad hoc networks under a probabilistic framework. We design topology control algorithms for the developme...
Vasileios Karyotis, Symeon Papavassiliou, Mary Gra...
In this paper we will be describing a new animation architecture and its implementation in our system LIVE. This model introduces a new blending layer approach which uses several ...
Vincent Bonnafous, Eric Menou, Jean-Pierre Jessel,...
Abstract. Mobile phones are increasingly becoming ubiquitous computational devices that are almost always available, individually adaptable, and nearly universally connectable (usi...
Christof Roduner, Marc Langheinrich, Christian Flo...