Sciweavers

1414 search results - page 97 / 283
» Combining Intruder Theories
Sort
View
SCA
2007
14 years 14 days ago
A decision network framework for the behavioral animation of virtual humans
We introduce a framework for advanced behavioral animation in virtual humans, which addresses the challenging open problem of simulating social interactions between pedestrians in...
Qinxin Yu, Demetri Terzopoulos
MJ
2006
71views more  MJ 2006»
13 years 10 months ago
Reliability analysis of the fine pitch connection using anisotropic conductive film (ACF)
A novel method (the V-shaped curve) is presented to predict the failure probability of anisotropic conductive film (ACF) in IC/substrate assemblies. The Poisson function is used t...
Chao-Ming Lin, Win-Jin Chang, Te-Hua Fang
CORR
1999
Springer
70views Education» more  CORR 1999»
13 years 9 months ago
Restart Strategies and Internet Congestion
We recently presented a methodology to quantitatively reduce the average time and variance in the time required to execute electronic transactions in a network environment such as...
Sebastian M. Maurer, Bernardo A. Huberman
ER
2007
Springer
237views Database» more  ER 2007»
14 years 4 months ago
Business Process and Business Rule Modeling Languages for Compliance Management: A Representational Analysis
Organizations are under increasing scrutiny to document their compliance to regulatory requirements. To this end, they have to formally document their operating procedures to supp...
Michael zur Muehlen, Marta Indulska, Gerrit Kamp
JCT
1998
193views more  JCT 1998»
13 years 9 months ago
Fractional Kernels in Digraphs
The aim of this note is to point out some combinatorial applications of a lemma of Scarf, proved first in the context of game theory. The usefulness of the lemma in combinatorics...
Ron Aharoni, Ron Holzman