Sciweavers

174 search results - page 31 / 35
» Creating Realistic BGP Models
Sort
View
CORR
2010
Springer
116views Education» more  CORR 2010»
13 years 2 months ago
Simulating Cyber-Attacks for Fun and Profit
We introduce a new simulation platform called Insight, created to design and simulate cyber-attacks against large arbitrary target scenarios. Insight has surprisingly low hardware...
Ariel Futoransky, Fernando Miranda, José Ig...
MIA
2010
95views more  MIA 2010»
13 years 2 months ago
Evaluation of brain atrophy estimation algorithms using simulated ground-truth data
A number of analysis tools have been developed for the estimation of brain atrophy using MRI. Since brain atrophy is being increasingly used as a marker of disease progression in ...
Swati Sharma, Vincent Noblet, François Rous...
IIE
2007
75views more  IIE 2007»
13 years 7 months ago
Program and Evaluation Planning Light: Planning in the Real World
Although there are many high-quality models for program and evaluation planning, these models are often too intensive to be used in situations when time and resources are scarce. A...
Justus J. Randolph, Pasi J. Eronen
SIGGRAPH
1995
ACM
13 years 11 months ago
Feature-based volume metamorphosis
Image metamorphosis, or image morphing, is a popular technique for creating a smooth transition between two images. For synthetic images, transforming and rendering the underlying...
Apostolos Lerios, Chase D. Garfinkle, Marc Levoy
CCR
2002
130views more  CCR 2002»
13 years 7 months ago
Network topologies, power laws, and hierarchy
It has long been thought that the Internet, and its constituent networks, are hierarchical in nature. Consequently, the network topology generators most widely used by the Interne...
Hongsuda Tangmunarunkit, Ramesh Govindan, Sugih Ja...