Default Cover Image

2020 Spring Simulation Conference (SpringSim)

May 18 2020 to May 21 2020

Fairfax, VA, USA

ISBN: 978-1-56555-370-5

Table of Contents

A Synergistic Approach for Deep Learning and Knowledge Engineered SolutionsFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
Studying Communications Resiliency in Emergency PlansFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
Estimating Effects of the Decision Support System on Educational Agents with SimulationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
Scenario-Based Generation of Ontologies for Domain-Specific LanguagesFull-text access may be available. Sign in or learn about subscription options.pp. 1-11
Strategic Airlift Operationalizing Constructive SimulationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
Coupling Weap and Leap Models Using Interaction ModelingFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
auto_diff: An Automatic Differentiation Package For PythonFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
Modeling the Modeler: An Empirical Study on how Modelers Learn to Create SimulationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
Model Thinking: An Approach for Coping with an Increasingly Complex WorldFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Generating High-Quality Synthetic Graphs for Community Detection in Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Deploy Mechanism for Virtual-Machine Based Vehicular Ad Hoc Network SimulationFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
Scalable Object Detection, Tracking and Pattern Recognition Model Using Edge ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 1-11
SBDC: Smart Building Data Center for Iot, Edge, and 5GFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
Studying Malware Propagation in Wireless Sensor Networks with Cell-DEVSFull-text access may be available. Sign in or learn about subscription options.pp. 1-11
Integrated Simulator Of Mobile Ad-Hoc Network-Based Infrastructure : A Case StudyFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
Scalability of Sensor Simulation in ROS-Gazebo Platform with and without Using GPUFull-text access may be available. Sign in or learn about subscription options.pp. 1-11
An Event Study of the Effects of Cryptocurrency Thefts on Cryptocurrency PricesFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
Enforcing Security and Privacy in Distributed Ledgers by Intel SGXFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
Simulation Based Modeling for a Cybersecure Power GridFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
Towards Real-Time Cyber-Physical Systems Instrumentation for Creating Digital TwinsFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
Development of A Real-Time Devs Kernel: RT-CadmiumFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
An Algorithm for Constructing Monotone Quintic Interpolating SplinesFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
Robustness of Multidimensional Optimization Outcomes: A General Approach and a Case StudyFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
Parallel Execution of DEVS in Shared-Memory Multicore ArchitecturesFull-text access may be available. Sign in or learn about subscription options.pp. 1-11
Artificial Social Ethics: Simulating Culture, Conflict, and CooperationFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Modeling and Simulating Pedestrian Social Group Behavior with Heterogeneous Social RelationshipsFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
Exploring The Effects of Link Recommendations on Social Networks: An Agent-Based Modeling ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
Using Agent Based Modeling to Interpret Underlying Factors of Underrepresentation of Minorities in Hollywood FilmsFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
Humans vs. Bots: investigating models of behavior in the iterated Prisoner’s dilemmaFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
Creating Perceptual Uncertainty in Agent-Based Models with Social InteractionsFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
Utilizing Agents to Explore Urban Shrinkage: A Case Study of DetroitFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
Along the Border: an Agent-Based Model of Migration Along the United States-Mexico BorderFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
A Phase Transition Model and Temporal Logic Specifications for Smart Energy Systems - RevisitedFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
Genetic Algorithm for Demand Response: A Stackelberg Game ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
A Framework for the Extension of DEVS With Sensor Fusion CapabilitiesFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
Movement, Disease and Patch Exploitation in Nesting Agent GroupsFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
An Object State Estimation for the Peg Transfer Task in Computer-Guided Surgical TrainingFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
A Framework for Secure Data Management for Medical DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
“Surgical Gps” Proof of Concept for Scoliosis SurgeryFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
The Effects of Filtering on High Frequency Oscillation ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 1-11
ECG-Based Virtual Pathology Stethoscope Tracking Using Transfer LearningFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Simulation and Analysis of Animal Movement Paths Using Numerus Model BuilderFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
Machine Learning of an Approximate Morphism of an Electronic Warfare Simulation ComponentFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
A Linear-Implicit Quantized Devs Nethod For Very Stiff Electrical Networks Using A Latency Insertion MethodFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
A Model Library for Finite State Machines in CadmiumFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
A Framework for Composable Cellular Automata Devs Modeling, Simulation, And VisualizationFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
Hybrid Iterative System Specification of Cyberphysical Systems: Neurocognitive Behavior ApplicationFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
Author IndexFreely available from IEEE.pp. i-iv
SCS Permission and Release FormFreely available from IEEE.pp. i-i
Showing 70 out of 70