default search action
SpringSim 2007: Norfolk, Virginia, USA
- Maurice J. Ades:
Proceedings of the 2007 Spring Simulation Multiconference, SpringSim 2007, Norfolk, Virginia, USA, March 25-29, 2007, Volume 3. SCS/ACM 2007, ISBN 1-56555-314-4
Industrial processes
- K. Bobzin, R. Nickel, D. Parkot, T. Kashko:
The application of spectral analysis in the numerical homogenization of non-periodic structures. 11-16 - Yong Zhang:
Dynamically simulating and visualizing the engineering specification of high power supply test system. 17-23 - Dug Hee Moon, Te Xu, Seung Geun Baek, Jun Seok Lee, Woo Young Shin:
A simulation study of the transmission case line in an automotive factory. 24-29
Environmental technology
- Thong Hang, Daniel I. Kaplan:
Modeling of the sub-surface reducing environment of the Z-Area Saltstone disposal facility at the Savannah River Site. 33-37 - Marek H. Zaluski, Mark A. Ewanic, Steve D. Dunstan:
Floodplain modeling for Paddy's Run at the DOE Fernald Site. 38-45 - Maurice J. Ades, L. B. Collard:
Sensitivity analysis for I-129 wastes: effect of hydraulic conductivity. 46-51
Optimization/decision analysis
- Otis Brooks:
Solving discrete resource allocation problems using the Simultaneous Perturbation Stochastic Approximation (SPSA) algorithm. 55-62 - Yuzhong Shen, John A. Sokolowski:
Hampton Roads hurricane evacuation arterial routes preliminary study. 63-68 - Ali Azadeh, S. F. Ghaderi, A. Dabbaghi, M. Dehghanbaghi:
Application of a multi-criteria simulation optimization based DSS. 69-76
Operations/manufacturing technology
- G. De Sensi, Francesco Longo, Giovanni Mirabelli:
Modeling & simulation based approach for optimizing seal press workstation in a manufacturing system. 79-83 - Agostino G. Bruzzone, Marina Massei, Simonluca Poggi:
Simulation based analysis on different logistics solutions for fresh food supply chain. 84-89 - Dug Hee Moon, Seung Geun Baek, Jun Seok Lee, Bing Lin Zhang, Yang Woo Shin, Young Gyoo Kim:
A case study of 3D simulation for developing automatic assembly line in the phone-camera industry. 90-95
Model analysis/simulation technology I
- Manjula A. Iyer, Layne T. Watson, Jeffrey B. Birch:
pRIPPLE: a parallel version of a polynomial-time piecewise linear estimation algorithm. 99-103 - Rex K. Kincaid, Michael J. Holroyd, Christopher Gatz:
Understanding the structure of power law networks. 104-111 - Andrew Greasley:
Gaining acceptance of simulation: a social challenge. 112-118
Model analysis/simulation technology II
- Jacob E. Boon:
Generating exact D-optimal designs for polynomial models. 121-126 - J. Paul Brooks, Eva K. Lee:
Mixed integer programming constrained discrimination model for credit screening. 127-132 - Maurice J. Ades, Mark Burgin:
Evolutionary processes in modeling and simulation. 133-138
Business simulation
- Garud Iyengar, David J. Phillips, Clifford Stein:
Models of malicious behavior in sponsored search. 143-151 - Rizwan Ahmed, Stewart Robinson:
Simulation in business and industry: how simulation context can affect simulation practice? 152-159
DAFM '07
- Jay-Evan J. Tevis, John A. Hamilton Jr.:
A security-centric ring-based software architecture. 163-169 - David A. Dryer, Thomas Bock, Maria Broschi, Timothy D. Beach:
DoDAF limitations and enhancements for the Capability Test Methodology. 170-176 - Johnny Garcia:
Executable architecture analysis modeling. 177-184
Training, exercises, and military operations
- Gregg T. Stubbendieck, Jeffrey B. Abbott:
Bridging the gap for embedded modeling and simulation. 193-198 - Daniel Bitts, Chris Blancett, Johnny J. Garcia, Kate T. Nguyen, Cynthia Tavarez:
Joint operation logistics transformation and training. 199-206 - Jim Goodwin, Richard Jones, Garry Morissette:
CROSSFIRE: an IDE for operational training. 207-214
The next step - game-based technologies I
- Paul A. Roman, Doug Brown:
Constructive simulation versus serious games: a Canadian case study. 217-224 - Ryan McAlinden, William Clevenger:
Using commercial game technology for the visualization and control of constructive simulations. 225-232 - Don Goddard, Paul H. Mauritz, Frank Vivirito:
Generating real 3D virtual worlds from imperfect data. 233-237
Research, development, and acquisition/advanced concepts and requirements
- Steven C. Flash Gordon:
Comparison and justification of science and technology needs for modeling and simulation across the Department of Defense. 241-250 - Mark J. Fiebrandt, Christine Mills, Timothy Beach:
Modeling and simulation in the analysis of a joint test and evaluation methodology. 251-256 - Robert M. Lehnherr, Steven E. Strukel:
The air assault expeditionary force (AAEF) experiment: examining the impact of technology on battle command using live, virtual and constructive simulation. 257-263
Entity and system modeling/behaviors
- W. Scott Neal Reilly, Karen A. Harper, Stephen Marotta:
Modeling concurrent, interacting behavior moderators for simulation-based acquisition tasks. 267-274 - Michael Hoffman, Josh Jackson:
Integrating culture, crowds and non-lethal effects into a constructive simulation for training and experimentation. 275-280
The next step - game-based technologies II
- Ken Doris, David Silvia:
Using gaming technology to model and predict target movement. 283-288 - Joseph M. Nolan:
Avoid painting walls with a hammer: a methodology for leveraging COTS/GOTS games for military training. 289-295 - Alicia Sanchez, Peter A. Smith:
Emerging technologies for military game-based training. 296-301
Networks/command and control
- John Donovan:
Modeling network attack in an aggregate simulation. 305-310 - Brian K. Hobson, Donald W. Kroening:
Cross command collaboration effort (3CE). 311-316 - Dennis M. Moen, J. Mark Pullen:
Private overlay multicast for the defense threat reduction agency collaboration center (DCC). 317-324
Physical modeling and effects
- Mitch Pohlman, Clinton Kam:
Energy based aerodynamic modeling: increasing fidelity of fixed-wing constructive entities. 327-336 - Mark A. Johnson, Paul Cote, Krystyna Truszkowska:
Determining the electrical gradients of electromagnetic launchers using the transmission line model. 337-341 - David M. Nicol, Steve Hanna, Frank Stratton, William H. Sanders:
Modeling and analysis of worm defense using stochastic activity networks. 349-355 - Kevin Richardson, John A. Hamilton Jr., Martin C. Carlisle:
A performance analysis of the spring protocol through simulation. 356-361 - Chwan-Hwa John Wu, Chun-Ching Andy Huang, J. David Irwin:
Using Identity-Based Privacy-Protected Access Control Filter (IPACF) to against denial of service attacks and protect user privacy. 362-369 - Leigh Flagg, Gordon Streeter, Andrew Potter:
Bringing knowledge to network defense. 370-377 - Winard Britt, Sundeep Gopalaswamy, John A. Hamilton Jr., Gerry V. Dozier, Kai H. Chang:
Computer defense using artificial intelligence. 378-386 - Men Long, Chwan-Hwa John Wu:
Defending against data forwarding misbehavior in sensor networks by quasimultipath technique: models and simulation. 387-394
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.