An Adaptive Cyberinfrastructure for Threat Management in Urban Water Distribution Systems
暂无分享,去创建一个
Gregor von Laszewski | Downey Brill | G. Mahinthakumar | S. Ranji Ranjithan | Emily Berglund | Sarat Sreepathi | Jim Uber | Ken Harrison
[1] Thomas M. Walski,et al. Analysis of water distribution systems , 1984 .
[2] Jack Dongarra,et al. Computational Science - ICCS 2005, 5th International Conference, Atlanta, GA, USA, May 22-25, 2005, Proceedings, Part I , 2005, International Conference on Computational Science.
[3] Julian F. Miller,et al. Genetic and Evolutionary Computation — GECCO 2003 , 2003, Lecture Notes in Computer Science.
[4] Frederica Darema,et al. Dynamic Data Driven Applications Systems: New Capabilities for Application Simulations and Measurements , 2005, International Conference on Computational Science.
[5] Gregor von Laszewski,et al. Workflow Concepts of the Java CoG Kit , 2005, Journal of Grid Computing.
[6] Steven G. Buchberger,et al. Intensity, Duration, and Frequency of Residential Water Demands , 1996 .
[7] Gregor von Laszewski,et al. A Repository Service for Grid Workflow Components , 2005, Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services - (icas-isns'05).
[8] Henk Nijmeijer. Book review: Estimation and control of systems / by Theodore F. Elbert. - New York : Van Nostrand Reinhold, 1984 , 1986 .
[9] Gregor von Laszewski,et al. Java CoG Kit Workflow , 2007, Workflows for e-Science, Scientific Workflows for Grids.
[10] Sylvia Richardson,et al. Markov Chain Monte Carlo in Practice , 1997 .
[11] James G. Uber,et al. The Threat Ensemble Vulnerability Assessment (TEVA) Program for Drinking Water Distribution System Security , 2004 .
[12] David J. Spiegelhalter,et al. Introducing Markov chain Monte Carlo , 1995 .