Sciweavers

1784 search results - page 126 / 357
» Comparing designs for computer simulation experiments
Sort
View
ECCV
2002
Springer
16 years 4 months ago
A New Image Registration Technique with Free Boundary Constraints: Application to Mammography
In this paper, a new image-matching mathematical model is presented for the mammogram registration. In a variational framework, an energy minimization problem is formulated and a m...
Frédéric J. P. Richard, Laurent D. C...
SIMUTOOLS
2008
15 years 3 months ago
An OMNeT++ model for the evaluation of OBS routing strategies
Optical Burst Switching (OBS) has been proposed as a costeffective paradigm for supporting, with adequate flexibility, the increasingly high transmission capacity required by the ...
A. L. Barradas, M. C. R. Medeiros
CMS
2006
175views Communications» more  CMS 2006»
15 years 3 months ago
Attack Graph Based Evaluation of Network Security
Abstract. The perspective directions in evaluating network security are simulating possible malefactor's actions, building the representation of these actions as attack graphs...
Igor V. Kotenko, Mikhail Stepashkin
ANSS
2005
IEEE
15 years 8 months ago
An Extensible Platform for Evaluating Security Protocols
We present a discrete-event network simulator, called Simnet, designed specifically for analyzing networksecurity protocols. The design and implementation is focused on simplicit...
Seny Kamara, Darren Davis, Lucas Ballard, Ryan Cau...
GRID
2003
Springer
15 years 7 months ago
Evaluating Scheduling and Replica Optimisation Strategies in OptorSim
Grid computing is fast emerging as the solution to the problems posed by the massive computational and data handling requirements of many current international scientific project...
David G. Cameron, Rubén Carvajal-Schiaffino...