Abstract is missing.
- The application of spectral analysis in the numerical homogenization of non-periodic structuresK. Bobzin, R. Nickel, D. Parkot, T. Kashko. 11-16 [doi]
- Dynamically simulating and visualizing the engineering specification of high power supply test systemYong Zhang. 17-23 [doi]
- A simulation study of the transmission case line in an automotive factoryDug Hee Moon, Te Xu, Seung Geun Baek, Jun-Seok Lee, Woo Young Shin. 24-29 [doi]
- Modeling of the sub-surface reducing environment of the Z-Area Saltstone disposal facility at the Savannah River SiteThong Hang, Daniel I. Kaplan. 33-37 [doi]
- Floodplain modeling for Paddy s Run at the DOE Fernald SiteMarek H. Zaluski, Mark A. Ewanic, Steve D. Dunstan. 38-45 [doi]
- Sensitivity analysis for I-129 wastes: effect of hydraulic conductivityMaurice J. Ades, L. B. Collard. 46-51 [doi]
- Solving discrete resource allocation problems using the Simultaneous Perturbation Stochastic Approximation (SPSA) algorithmOtis Brooks. 55-62 [doi]
- Hampton Roads hurricane evacuation arterial routes preliminary studyYuzhong Shen, John A. Sokolowski. 63-68 [doi]
- Application of a multi-criteria simulation optimization based DSSA. Azadeh, S. F. Ghaderi, A. Dabbaghi, M. Dehghanbaghi. 69-76 [doi]
- Modeling & simulation based approach for optimizing seal press workstation in a manufacturing systemG. De Sensi, Francesco Longo, Giovanni Mirabelli. 79-83 [doi]
- Simulation based analysis on different logistics solutions for fresh food supply chainAgostino G. Bruzzone, Marina Massei, Simonluca Poggi. 84-89 [doi]
- A case study of 3D simulation for developing automatic assembly line in the phone-camera industryDug Hee Moon, Seung Geun Baek, Jun-Seok Lee, Bing Lin Zhang, Yang Woo Shin, Young Gyoo Kim. 90-95 [doi]
- pRIPPLE: a parallel version of a polynomial-time piecewise linear estimation algorithmManjula A. Iyer, Layne T. Watson, Jeffrey B. Birch. 99-103 [doi]
- Understanding the structure of power law networksRex K. Kincaid, Michael J. Holroyd, Christopher Gatz. 104-111 [doi]
- Gaining acceptance of simulation: a social challengeAndrew Greasley. 112-118 [doi]
- Generating exact ::::D::::-optimal designs for polynomial modelsJacob E. Boon. 121-126 [doi]
- Mixed integer programming constrained discrimination model for credit screeningPaul Brooks, Eva Lee. 127-132 [doi]
- Evolutionary processes in modeling and simulationMaurice J. Ades, Mark Burgin. 133-138 [doi]
- Models of malicious behavior in sponsored searchGarud lyengar, David Phillips, Cliff Stein. 143-151 [doi]
- Simulation in business and industry: how simulation context can affect simulation practice?Rizwan Ahmed, Stewart Robinson. 152-159 [doi]
- A security-centric ring-based software architectureJay-Evan J. Tevis, John A. Hamilton Jr.. 163-169 [doi]
- DoDAF limitations and enhancements for the Capability Test MethodologyDavid A. Dryer, Thomas Bock, Maria Broschi, Timothy D. Beach. 170-176 [doi]
- Executable architecture analysis modelingJohnny Garcia. 177-184 [doi]
- Bridging the gap for embedded modeling and simulationGregg T. Stubbendieck, Jeffrey B. Abbott. 193-198 [doi]
- Joint operation logistics transformation and trainingDaniel Bitts, Chris Blancett, Johnny J. Garcia, Kate T. Nguyen, Cynthia Tavarez. 199-206 [doi]
- CROSSFIRE: an IDE for operational trainingJim Goodwin, Richard Jones, Garry Morissette. 207-214 [doi]
- Constructive simulation versus serious games: a Canadian case studyPaul A. Roman, Doug Brown. 217-224 [doi]
- Using commercial game technology for the visualization and control of constructive simulationsRyan McAlinden, William Clevenger. 225-232 [doi]
- Generating real 3D virtual worlds from imperfect dataDon Goddard, Paul H. Mauritz, Frank Vivirito. 233-237 [doi]
- Comparison and justification of science and technology needs for modeling and simulation across the Department of DefenseSteven C. Flash Gordon. 241-250 [doi]
- Modeling and simulation in the analysis of a joint test and evaluation methodologyMark J. Fiebrandt, Christine Mills, Timothy Beach. 251-256 [doi]
- The air assault expeditionary force (AAEF) experiment: examining the impact of technology on battle command using live, virtual and constructive simulationRobert M. Lehnherr, Steven E. Strukel. 257-263 [doi]
- Modeling concurrent, interacting behavior moderators for simulation-based acquisition tasksW. Scott Neal Reilly, Karen A. Harper, Stephen Marotta. 267-274 [doi]
- Integrating culture, crowds and non-lethal effects into a constructive simulation for training and experimentationMichael Hoffman, Josh Jackson. 275-280 [doi]
- Using gaming technology to model and predict target movementKen Doris, David Silvia. 283-288 [doi]
- Avoid painting walls with a hammer: a methodology for leveraging COTS/GOTS games for military trainingMajor Joseph M. Nolan. 289-295 [doi]
- Emerging technologies for military game-based trainingAlicia Sanchez, Peter A. Smith. 296-301 [doi]
- Modeling network attack in an aggregate simulationJohn Donovan. 305-310 [doi]
- Cross command collaboration effort (3CE)Brian K. Hobson, Donald W. Kroening. 311-316 [doi]
- Private overlay multicast for the defense threat reduction agency collaboration center (DCC)Dennis M. Moen, J. Mark Pullen. 317-324 [doi]
- Energy based aerodynamic modeling: increasing fidelity of fixed-wing constructive entitiesMitch Pohlman, Clinton Kam. 327-336 [doi]
- Determining the electrical gradients of electromagnetic launchers using the transmission line modelMark Johnson, Paul Cote, Krystyna Truszkowska. 337-341 [doi]
- Modeling and analysis of worm defense using stochastic activity networksDavid M. Nicol, Steve Hanna, Frank Stratton, William H. Sanders. 349-355 [doi]
- A performance analysis of the spring protocol through simulationKevin Richardson, John A. Hamilton Jr., Martin C. Carlisle. 356-361 [doi]
- Using Identity-Based Privacy-Protected Access Control Filter (IPACF) to against denial of service attacks and protect user privacyChwan-Hwa John Wu, Chun-Ching Andy Huang, J. David Irwin. 362-369 [doi]
- Bringing knowledge to network defenseLeigh Flagg, Gordon Streeter, Andrew Potter. 370-377 [doi]
- Computer defense using artificial intelligenceWinard Britt, Sundeep Gopalaswamy, John. A. Hamilton, Gerry V. Dozier, Kai H. Chang. 378-386 [doi]
- Defending against data forwarding misbehavior in sensor networks by quasimultipath technique: models and simulationMen Long, Chwan-Hwa John Wu. 387-394 [doi]