Sciweavers

3516 search results - page 666 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
116
Voted
ECML
2006
Springer
15 years 6 months ago
Bayesian Active Learning for Sensitivity Analysis
Abstract. Designs of micro electro-mechanical devices need to be robust against fluctuations in mass production. Computer experiments with tens of parameters are used to explore th...
Tobias Pfingsten
130
Voted
EUROPAR
2008
Springer
15 years 4 months ago
DGSim: Comparing Grid Resource Management Architectures through Trace-Based Simulation
Abstract. Many advances in grid resource management are still required to realize the grid computing vision of the integration of a worldwide computing infrastructure for scientifi...
Alexandru Iosup, Omer Ozan Sonmez, Dick H. J. Epem...
82
Voted
FLAIRS
2003
15 years 4 months ago
Decision Evaluation of Three Flood Management Strategies
This article describes the application of computational decision analytic techniques for a national policy decision. It constitutes an example of the increasing use of modern comp...
Mats Danielson, Love Ekenberg, Jim Johansson
121
Voted
WSC
2004
15 years 3 months ago
Enabling a Transforming Army at War: Analysis to Improve Logistics Network Efficiency and Effectiveness
This paper introduces and summarizes a comprehensive systems approach guiding an ongoing project addressing these significant challenges confronting logistics transformation. Curr...
Greg H. Parlier
122
Voted
ATAL
2010
Springer
15 years 3 months ago
Bushfire BLOCKS: a modular agent-based simulation
Bushfire BLOCKS is a modular, distributed, agent-based simulation for exploring and informing bushfire response strategies. Separate independent modules capture the fire spread, e...
David Scerri, Ferdinand Gouw, Sarah L. Hickmott, I...