Results 301 to 310 of about 926,531 (351)
Some of the next articles are maybe not open access.

Towards simulation of simulating enterprises

Proceedings of the 4th international conference conference on Computer systems and technologies e-Learning - CompSysTech '03, 2003
The software R-TRANSFORM converts a conventional simulation model into a simulation model of the same system including one or more computers that apply the simulation model during the system operation in order to anticipate the near future and - according to the anticipation - to enhance the system efficiency.
Ivan Krivý   +2 more
openaire   +1 more source

To simulate or not to simulate…

1992
Many neural network structures provide a regularity which allows for efficient implementation in hardware devices. However, the performance of these designs is often limited by other factors to levels which fall well short of those expected. The paper discusses a number of these factors and indicates characteristics which make problems more or less ...
openaire   +1 more source

Simulation of Simulation

Virtual Technologies in Medicine
The article presents an analysis of the effectiveness of work and defects in the organization of "simulation rooms" at medical institutions in Khabarovsk and the Khabarovsk Territory.
openaire   +1 more source

SIMULATION: A SURVEY

Papers presented at the May 9-11, 1961, western joint IRE-AIEE-ACM computer conference on - IRE-AIEE-ACM '61 (Western), 1961
Simulation may be traced back to the beginning of time -- be it the make-believe world of the child at play, or the adult make-believe world of the stage. The impetus for modern scientific simulation came with the development of analog computers in the 1930's; and progressed even further when the electronic digital computers were created.
openaire   +1 more source

Simulating the Simulator: Deterministic PRAM Simulation on a Mesh Simulator.

1995
The Parallel Random Access Machine, \de{PRAM}, is the dominant theoretical parallel computer model. It consists of a number ofprocessing units, \de{PU}s, which operate synchronously, and which can access a shared memory in constant time. Unfortunately, this high-level model is hardly realizable in hardware using current technology.
Meyer, U., Sibeyn, J.
openaire   +1 more source

Software for simulation

Proceedings of the 27th conference on Winter simulation - WSC '95, 1993
This tutorial describes computer languages and other software packages that support discrete-event simulation.
openaire   +1 more source

A Simulation on the Design of Simulations

Simulation & Gaming, 1990
This article briefly describes a game design process developed by the authors. This process is then used as the basis of a simulation focusing on the design of simulations. The specification of materials related to the first three stages in the design process are given to the participants who then develop, in groups, an outline design for a simulation
Donald C. Thatcher, M. June Robinson
openaire   +1 more source

Simulations of Simulations in Evolutionary Robotics

2007
In recent years simulation tools for agent-environment interactions have included increasingly complex and physically realistic conditions. These simulations pose challenges for researchers interested in evolutionary robotics because the computational expense of running multiple evaluations can be very high.
Edgar Bermudez Contreras, Anil K. Seth
openaire   +1 more source

Simulation of endoscopy

1995
We present a simulation for endoscopic procedures. The anatomy of the patient is represented by 3D polyhedral models, computed from tomographic images. The simulation program can be used as a training system, or for prior simulation of complicated individual cases to reduce the error rate and to decide on the feasibility of biopsies.
Bernhard Geiger, Ron Kikinis
openaire   +1 more source

Simulation Opacity

Fundamenta Informaticae, 2014
Opacity testing is formalized and studied. We specify opacity testers as well as tested systems by (timed) process algebras. We model various testers according to how sophisticated observations of tested system they can make and which kind of conclusions they can obtain. We use this technique to define several realistic security properties.
openaire   +2 more sources

Home - About - Disclaimer - Privacy