


default search action
SpringSim 2011: Boston, MA, USA
- Andrew G. Stricker:

2011 Spring Simulation Multi-conference, SpringSim '11, Boston, MA, USA, April 03-07, 2011. Volume 7: Proceedings of the 2011 Military Modeling & Simulation Symposium (MMS). SCS/ACM 2011 - Andrew G. Stricker, Kimberly-Combs Hardy, Elizabeth S. Stricker, Toni A. Scribner, John A. Cook, Cynthia M. Calongne, Kathryn L. Flitter, Fil J. Arenas:

Third-space architecture for learning in 3D. 3-10 - Joseph Venezia, Adam Peloquin:

Using a constructive simulation to select a camouflage pattern for use in OEF. 11-18 - Daniel Rice, Mitha Andra:

Task degradation in agent-based simulation. 19-22 - Mitha Andra, Nazli El Samaloty, Lew Farkus:

The modeling and simulation of non-lethal weapons in constructive simulation. 23-27 - Kyle E. Stewart, Todd R. Andel, Jeffrey W. Humphries:

Measuring the performance of network virtualization tool N2N in the design of a cyber warfare training and education platform. 28-35 - Daniel de Vasconcelos Campos, Roberto de Beauclair Seixas:

Command and Control: a low cost framework to remotely monitor military training. 36-43 - Jerry M. Couretas, Mehmet E. Ucal:

Organizational adoption of innovation: background, programs & a descriptive modeling approach. 44-52 - Robert H. Kewley, Samy Chatelet, Antione Hellio:

Coalition battle management language extensions for simulation interoperability. 53-60 - Sharad Sharma, Stephen Otunba:

Virtual reality as a theme-based game tool for homeland security applications. 61-65 - Emin Kugu, Jiang Li, Frederic D. McKenzie, Ozgur Koray Sahingoz:

Fuzzy logic injury design for crowd modeling. 66-72 - Ian M. Chapman, Sylvain P. Leblanc, Andrew Partington:

Taxonomy of cyber attacks and simulation of their effects. 73-80 - Linda Hamons, Cynthia M. Calongne, Andrew G. Stricker, Anne-Marie Armstrong:

A methodology for evaluating shared leadership in a game simulation kit. 81-85 - Tristan E. Johnson, Rinat B. Rosenberg-Kima:

Development of a training effects algorithm for modeling the impact of training in IMPRINT for 21st century Air Force needs. 86-91 - Sylvain P. Leblanc, Andrew Partington, Ian M. Chapman, Melanie Bernier:

An overview of cyber attack and computer network operations simulation. 92-100 - Donald J. Herod, John M. LaCrosse:

The application of MTWS in the simulation of non-kinetic environment. 101-107 - Daniel C. McKaughan, Zachary Heath, J. T. McClain:

Using a text analysis and categorization tool to generate Bayesian belief networks for use in cognitive social simulation from a document corpus. 108-115 - Mike K. Stinchfield, Jason C. Caldwell:

Manual wargaming as a method for training: an analysis of the commercial wargame "Battle for Baghdad". 116-125 - Ozkan Ozcan, Claudio Coreixas de Moraes, Jonathan K. Alt:

Balancing exploration and exploitation ratio in reinforcement learning. 126-131

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














