Sciweavers

4250 search results - page 111 / 850
» Understanding the Requirements on Modelling Techniques
Sort
View
SP
2007
IEEE
148views Security Privacy» more  SP 2007»
14 years 3 months ago
DSSS-Based Flow Marking Technique for Invisible Traceback
Law enforcement agencies need the ability to conduct electronic surveillance to combat crime, terrorism, or other malicious activities exploiting the Internet. However, the prolif...
Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zh...
IPPS
2008
IEEE
14 years 3 months ago
A game theoretical data replication technique for mobile ad hoc networks
Adaptive replication of data items on servers of a mobile ad hoc network can alleviate access delays. The selection of data items and servers requires solving a constrained optimi...
Samee Ullah Khan, Anthony A. Maciejewski, Howard J...
ICONS
2008
IEEE
14 years 3 months ago
Dynamic Modeling and Control of Nonholonomic Mobile Robot with Lateral Slip
— Nonholonomic mobile robots are characterized by no-slip constraints. However, in many practical situations, slips are inevitable. In this work, we develop a theoretical and sys...
Naim Sidek, Nilanjan Sarkar
ICSM
1995
IEEE
14 years 20 days ago
Domain-retargetable reverse engineering. III. Layered modeling
This paper describes ongoing work on a domainretargetable reverse engineering environment which is used to aid the structural understanding of large information spaces. In particu...
Scott R. Tilley
CPHYSICS
2007
85views more  CPHYSICS 2007»
13 years 9 months ago
The essential role of visualization for modeling nanotubes and nanodiamond
Visualization techniques to help understand the structure of carbon and its allotropes have been developed and applied to atomistic simulation projects which model different carb...
Joan Adler, J. Fox, R. Kalish, T. Mutat, A. Sorkin...