Sciweavers

471 search results - page 48 / 95
» Exploration of Simulation Experiments by Discovery
Sort
View
PE
2006
Springer
193views Optimization» more  PE 2006»
13 years 7 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
CHI
2005
ACM
14 years 8 months ago
Calling while driving: effects of providing remote traffic context
Cell phone conversations distract drivers. This research explores the possibility of reducing distracting by providing callers with remote information about the driver's traf...
Mike Schneider, Sara B. Kiesler
IDA
2009
Springer
14 years 17 days ago
Visualization-Driven Structural and Statistical Analysis of Turbulent Flows
Knowledge extraction from data volumes of ever increasing size requires ever more flexible tools to facilitate interactive query. Interactivity enables real-time hypothesis testin...
Kenny Gruchalla, Mark Rast, Elizabeth Bradley, Joh...
WSC
2001
13 years 9 months ago
Implementation of response surface methodology using variance reduction techniques in semiconductor manufacturing
Semiconductor manufacturing is generally considered a cyclic industry. As such, individual producers able to react quickly and appropriately to market conditions will have a compe...
Charles D. McAllister, Bertan Altuntas, Matthew Fr...
ICRA
2008
IEEE
165views Robotics» more  ICRA 2008»
14 years 2 months ago
Macromodel for the mechanics of gecko hair adhesion
—In this work, we explore the mechanical behavior of gecko hairs by means of macromodels. The macromodel has four spatular hairs operating by magnetic forces instead of van der W...
Michael P. Reyes, Ronald S. Fearing