Sciweavers

784 search results - page 20 / 157
» An underlying model for defeat mechanisms
Sort
View
IEAAIE
2011
Springer
13 years 1 months ago
A Cognitive Agent Model Using Inverse Mirroring for False Attribution of Own Actions to Other Agents
This paper presents a cognitive agent model capable of showing situations where self-generated actions are attributed to other agents, as, for example, for patients suffering from ...
Jan Treur, Muhammad Umair
TITB
2002
88views more  TITB 2002»
13 years 9 months ago
A computational skin model: fold and wrinkle formation
This paper presents a computational model for studying the mechanical properties of skin with aging. In particular, attention is given to the folding capacity of skin, which may b...
Nadia Magnenat-Thalmann, Prem Kalra, Jean Luc L&ea...
ICOIN
2007
Springer
14 years 3 months ago
On Modeling Counteraction against TCP SYN Flooding
One of the main problems of network security is Distributed Denial of Service (DDoS) caused by TCP SYN packet flooding. To counteract SYN flooding attack, several defense methods...
Vladimir V. Shakhov, Hyunseung Choo
ISTA
2004
13 years 11 months ago
A Conceptual Modeling Technique Based on Semantically Complete Model, Its Applications
: The article proposes a conceptual modeling technique based on Semantically Complete model, the main property of which is that relations carry complete information about interconn...
Vladimir Ovchinnikov
SIGCOMM
1998
ACM
14 years 1 months ago
Modeling TCP Throughput: A Simple Model and Its Empirical Validation
In this paper we develop a simple analytic characterization of the steady state throughput, as a function of loss rate and round trip time for a bulk transfer TCP flow, i.e., a ï...
Jitendra Padhye, Victor Firoiu, Donald F. Towsley,...