Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
SPRINGSIM
SPRINGSIM 2020
Generate Citations
2020 Spring Simulation Conference (SpringSim)
May 18 2020 to May 21 2020
Fairfax, VA, USA
ISBN: 978-1-56555-370-5
Table of Contents
Reinforcement Learning from Simulated Environments: An Encoder Decoder Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Benjamin Choo
,
Graham Crannel
,
Stephen Adams
,
Faraz Dadgostari
,
Peter A. Beling
,
Ann Bolcavage
,
Roy McIntyre
Feature Transformation and Simulation of Short Term Price Variability in Reinforcement Learning for Portfolio Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Yen-Chih Lin
,
Jeremy Blum
A Synergistic Approach for Deep Learning and Knowledge Engineered Solutions
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Joshua Haley
,
Richard Pazda
,
Ross Hoehn
,
Robert Wray
Predicting The Resource Needs And Outcomes of Computationally Intensive Biological Simulations
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Andrew Fisher
,
Bhisma Adhikari
,
Chao Zhai
,
Joshua E. Morgan
,
Vijay K. Mago
,
Philippe J. Giabbanelli
Studying Communications Resiliency in Emergency Plans
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Cristina Ruiz-Martin
,
Gabriel Wainer
,
Adolfo Lopez-Paredes
Estimating Effects of the Decision Support System on Educational Agents with Simulations
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Ajay Kulkarni
,
Michael Eagle
Scenario-Based Generation of Ontologies for Domain-Specific Languages
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Bharvi Chhaya
,
Shafagh Jafer
Strategic Airlift Operationalizing Constructive Simulations
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Rob Barwell
,
Gabriel Wainer
Coupling Weap and Leap Models Using Interaction Modeling
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Mostafa D. Fard
,
Hessam S. Sarjoughian
auto_diff: An Automatic Differentiation Package For Python
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Parth Nobel
Exploratory Analysis to Address Deep Uncertainty – Using Calibratable System Models for Exploratory Simulation of Complex Missions
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Andreas Tolk
,
Khuong Dinh
,
Kevin Comer
,
Steve Scott
Modeling the Modeler: An Empirical Study on how Modelers Learn to Create Simulations
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Hamdi Kavak
,
Jose Padilla
,
Saikou Diallo
,
Anthony Barraco
Model Thinking: An Approach for Coping with an Increasingly Complex World
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Saikou Y. Diallo
,
Samarth Swarup
Experimental Wargames to Address the Complexity–Scarcity Gap
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Kiran Lakkaraju
,
Jason Reinhardt
,
Joshua Letchford
,
Jonathan Whetzel
,
Bethany L. Goldblum
,
Andrew W. Reddie
Generating High-Quality Synthetic Graphs for Community Detection in Social Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Arman Ferdowsi
,
Abdolreza Abhari
Deploy Mechanism for Virtual-Machine Based Vehicular Ad Hoc Network Simulation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Akihito Kohiga
,
Yoichi Shinoda
Scalable Object Detection, Tracking and Pattern Recognition Model Using Edge Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Dipak Pudasaini
,
Abdolreza Abhari
SBDC: Smart Building Data Center for Iot, Edge, and 5G
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Hassan Rajaei
,
Bhargav Kanumuri
,
Nishitha Narreddi
Studying Malware Propagation in Wireless Sensor Networks with Cell-DEVS
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Ala’a Al-Habashna
,
Gabriel Wainer
Integrated Simulator Of Mobile Ad-Hoc Network-Based Infrastructure : A Case Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Aznam Yacoub
Scalability of Sensor Simulation in ROS-Gazebo Platform with and without Using GPU
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Ahmet Saglam
,
Yiannis Papelis
An Event Study of the Effects of Cryptocurrency Thefts on Cryptocurrency Prices
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Michael Scott Brown
,
Barry Douglass
Enforcing Security and Privacy in Distributed Ledgers by Intel SGX
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Xueping Liang
,
Sachin Shetty
,
Peter Foytik
,
Deepak Tosh
A Blockchain Simulator for Evaluating Consensus Algorithms in Diverse Networking Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Peter Foytik
,
Sachin Shetty
,
Sarada Prasad Gochhayat
,
Eranga Herath
,
Deepak Tosh
,
Laurent Njilla
On the Comparative Study of Prediction Accuracy for Credit Card Fraud Detection wWith Imbalanced Classifications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Tahani Baabdullah
,
Amani Alzahrani
,
Danda B. Rawat
On the Influence Blocking Maximization for Minimizing the Spreading of Fake information in Social Media
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Dema S. Alorini
,
Danda B. Rawat
,
Ghaida S. Alorini
Simulation Based Modeling for a Cybersecure Power Grid
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Michael Mesham
,
Mahmoud Fahmy
,
Nurcin Celik
Towards Real-Time Cyber-Physical Systems Instrumentation for Creating Digital Twins
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Joost Mertens
,
Moharram Challenger
,
Ken Vanherpen
,
Joachim Denil
Development of A Real-Time Devs Kernel: RT-Cadmium
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Ben Earle
,
Kyle Bjornson
,
Cristina Ruiz-Martin
,
Gabriel Wainer
A Simulator for Trading Traffic Privileges by Selfish Driving Cars
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Zhan Tu
,
Anastasios Dimas
,
Mehmet Necip Kurt
,
Anastasia Mavrommati
,
Pieter J. Mosterman
,
Akshay Rajhans
,
Roberto G. Valenti
Managing Computationally Expensive Blackbox Multiobjective Optimization Problems With Libensemble
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Tyler H. Chang
,
Jeffrey Larson
,
Layne T. Watson
,
Thomas C.H. Lux
Simulator-Based Framework towards Improved Cache Predictability for Multi-Core Avionic Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Jean-Baptiste Lefoul
,
Alexy Torres Aurora Dugo
,
Felipe Magalhaes
,
Gabriela Nicolescu
,
Dahman Assal
,
Nicolas Ulysse
An Algorithm for Constructing Monotone Quintic Interpolating Splines
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Thomas C. H. Lux
,
Layne T. Watson
,
Tyler H. Chang
,
Li Xu
,
Yueyao Wang
,
Yili Hong
Robustness of Multidimensional Optimization Outcomes: A General Approach and a Case Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Negin Forouzesh
,
Layne T. Watson
,
Alexey V. Onufriev
Parallel Execution of DEVS in Shared-Memory Multicore Architectures
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Juan Lanuza
,
Guillermo G. Trabes
,
Gabriel A. Wainer
Fuzzy Cognitive Maps in Agent Based Models: A Practicial Implementation Example
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Christopher W. H. Davis
,
Antonie J. Jetter
,
Philippe J. Giabbanelli
Digital Modelling and Simulation in French Social Sciences and Humanities Research: An Exploratory Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Nathalie Pinède
,
Bruno Vallespir
,
Mamadou K. Traoré
,
Saikou Y. Diallo
,
Grégory Zacharewicz
Artificial Social Ethics: Simulating Culture, Conflict, and Cooperation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
F. LeRon Shults
,
Wesley J. Wildman
Modeling and Simulating Pedestrian Social Group Behavior with Heterogeneous Social Relationships
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Manon Prédhumeau
,
Julie Dugdale
,
Anne Spalanzani
Modeling Marginalization: Emergence, Social Physics, and Social Ethics of Bullying
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Themis D. Xanthopoulou
,
Ivan Puga-Gonzalez
,
F. LeRon Shults
,
Andreas Prinz
Exploring The Effects of Link Recommendations on Social Networks: An Agent-Based Modeling Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Ciara Sibley
,
Andrew T. Crooks
How do Modelers Code Artificial Societies? Investigating Practices and Quality of Netlogo Codes from Large Repositories
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Christopher Vendome
,
Dhananjai M. Rao
,
Philippe J. Giabbanelli
Using Agent Based Modeling to Interpret Underlying Factors of Underrepresentation of Minorities in Hollywood Films
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Carmen A. Iasiello
Humans vs. Bots: investigating models of behavior in the iterated Prisoner’s dilemma
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Samarth Swarup
,
Mark G. Orr
,
Gizem Korkmaz
,
Kiran Lakkaraju
Creating Perceptual Uncertainty in Agent-Based Models with Social Interactions
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Ethan O. Grantham
,
Philippe J. Giabbanelli
Utilizing Agents to Explore Urban Shrinkage: A Case Study of Detroit
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Na Jiang
,
Andrew T. Crooks
Along the Border: an Agent-Based Model of Migration Along the United States-Mexico Border
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Amira Al-Khulaidy
,
Melanie Swartz
A Phase Transition Model and Temporal Logic Specifications for Smart Energy Systems - Revisited
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Byungkwon Park
,
Mohammed M. Olama
Genetic Algorithm for Demand Response: A Stackelberg Game Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Kadir Amasyali
,
Mohammed M. Olama
,
Yang Chen
Determining the Reaction Time for Triggering Supportive Control Actions to Guarantee Adequate Frequency Response in Smart Grids
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Jiecai Luo
,
Seddik M. Djouadi
,
Mohammed M. Olama
,
Yichen Zhang
A Framework for the Extension of DEVS With Sensor Fusion Capabilities
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Joseph Boi-Ukeme
,
Gabriel Wainer
Movement, Disease and Patch Exploitation in Nesting Agent Groups
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Wayne M. Getz
,
Krti Tallam
,
Richard Salter
The Mitre Maternal Mortality Interactive Dashboard (3mid): A Tool For Assessing The Effectiveness and Equity of Quality Improvement Toolkits on Maternal Care
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Kevin T. Comer
,
Abdul Sheikhnureldin
,
Rachel E. Mayer
,
Sybil A. Klaus
Simulation of New Healthcare Delivery to Evaluate Impacts on Patient Access to Care: a Telehealth Supply and Demand use Case
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Matthew Henchey
,
Deborah Ercolini
,
Sybil Klaus
An Object State Estimation for the Peg Transfer Task in Computer-Guided Surgical Training
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Kai Meisner
,
Minsik Hong
,
Jerzy W. Rozenblit
A Framework for Secure Data Management for Medical Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Ibrahim Almazyad
,
Aakarsh Rao
,
Jerzy Rozenblit
Handling the Missing Data Problem in Electronic Health Records for Cancer Prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Xudong Zhang
,
Jiehao Xiao
,
Yifei Gong
,
Ning Yu
,
Wei Zhang
,
Sunghoon Jang
,
Feng Gu
“Surgical Gps” Proof of Concept for Scoliosis Surgery
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Austin Tapp
,
Michel Audette
The Effects of Filtering on High Frequency Oscillation Classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Jiaju Liu
,
Rachael Garner
,
Marianna La Rocca
,
Eun-Kee Bae
,
Dominique Duncan
ECG-Based Virtual Pathology Stethoscope Tracking Using Transfer Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Haben Yhdego
,
Nahom Kidane
,
Frederick Mckenzie
,
Michel Audette
Automated, Reactive Pruning of System Entity Structures for Simulation Engineering
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Hendrik Folkerts
,
Thorsten Pawletta
,
Christina Deatcu
,
Bernard P. Zeigler
Application of a Model-Driven Approach to the Development of Distributed Simulations: the ESA HRAF Case
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Andrea D’Ambrogio
,
Paolo Bocciarelli
,
Juan Delfa
,
Aron Kisdi
Simulation and Analysis of Animal Movement Paths Using Numerus Model Builder
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Wayne M. Getz
,
Ludovica Luisa Vissat
,
Richard Salter
Machine Learning of an Approximate Morphism of an Electronic Warfare Simulation Component
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Donald E. Jarvis
A Linear-Implicit Quantized Devs Nethod For Very Stiff Electrical Networks Using A Latency Insertion Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Joseph M. Hood
,
Roger A. Dougal
A Model Library for Finite State Machines in Cadmium
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Amitav Shaw
,
Arshpreet Singh
,
Gabriel Wainer
A Framework for Composable Cellular Automata Devs Modeling, Simulation, And Visualization
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Chao Zhang
,
Hessam S. Sarjoughian
,
Moon Gi Seok
Hybrid Iterative System Specification of Cyberphysical Systems: Neurocognitive Behavior Application
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Bernard P. Zeigler
Author Index
Freely available from IEEE.
pp. i-iv
SCS Permission and Release Form
Freely available from IEEE.
pp. i-i
Showing 70 out of 70