Sciweavers

5054 search results - page 912 / 1011
» simulation 2008
Sort
View
IJMI
2008
97views more  IJMI 2008»
13 years 10 months ago
Positive effects of electronic patient records on three clinical activities
Purpose: To investigate the effects of a fully functional electronic patient record (EPR) system on clinicians' work during team conferences, ward rounds, and nursing handove...
Morten Hertzum, Jesper Simonsen
IJNSEC
2008
201views more  IJNSEC 2008»
13 years 10 months ago
Detecting and Preventing IP-spoofed Distributed DoS Attacks
In this paper, we explore mechanisms for defending against Distributed Denial of Service (DDoS) attacks, have become one of the major threats to the operation of the Internet toda...
Yao Chen, Shantanu Das, Pulak Dhar, Abdulmotaleb E...
IJNSEC
2008
124views more  IJNSEC 2008»
13 years 10 months ago
Scalable Delay-constrained Multicast Group Key Management
In the last few years, multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. Some multicast applications requi...
Said Gharout, Yacine Challal, Abdelmadjid Bouabdal...
IJRR
2008
139views more  IJRR 2008»
13 years 10 months ago
Learning to Control in Operational Space
One of the most general frameworks for phrasing control problems for complex, redundant robots is operational space control. However, while this framework is of essential importan...
Jan Peters, Stefan Schaal
IJSN
2008
145views more  IJSN 2008»
13 years 10 months ago
Clique-based group key assignment in Wireless Sensor Networks
: Security has become the corner stone of research in wireless sensor networks (WSNs). Due to the unique operational environment of WSNs, where the communication medium is open to ...
Avinash Srinivasan, Feng Li, Jie Wu, Minglu Li