This paper presents a cognitive agent model capable of showing situations where self-generated actions are attributed to other agents, as, for example, for patients suffering from ...
This paper presents a computational model for studying the mechanical properties of skin with aging. In particular, attention is given to the folding capacity of skin, which may b...
Nadia Magnenat-Thalmann, Prem Kalra, Jean Luc L&ea...
One of the main problems of network security is Distributed Denial of Service (DDoS) caused by TCP SYN packet flooding. To counteract SYN flooding attack, several defense methods...
: The article proposes a conceptual modeling technique based on Semantically Complete model, the main property of which is that relations carry complete information about interconn...
In this paper we develop a simple analytic characterization of the steady state throughput, as a function of loss rate and round trip time for a bulk transfer TCP flow, i.e., a ï...
Jitendra Padhye, Victor Firoiu, Donald F. Towsley,...