Author of the publication

Experimenting with real time simulation parameters for fluid model of soft bodies.

, and . SpringSim, page 158. SCS/ACM, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Service-Oriented Routing Algorithm for Heterogeneous Wireless Mesh Networks., , and . GLOBECOM, page 1-5. IEEE, (2011)Dynamic microprogramming in a time sharing environment.. MICRO, page 55-60. ACM, (1977)A Distributed Security Architecture for ad hoc Networks., , and . Wireless Information Systems, page 81-91. INSTICC Press, (2005)972-8865-21-X.Enhancing Message Privacy in WEP., and . Wireless Information Systems, page 23-32. INSTICC Press, (2005)972-8865-21-X.The Two's Complement Quasi-Serial Multiplier., and . IEEE Trans. Computers, 24 (12): 1233-1235 (1975)Understanding the intruder through attacks on cryptographic protocols., , and . ACM Southeast Regional Conference, page 667-672. ACM, (2006)Interactive Evolution of Particle Systems for Computer Graphics and Animation., , and . IEEE Trans. Evol. Comput., 13 (2): 418-432 (2009)Simulation Methods and Applications., and . Simul. Pract. Theory, 9 (3-5): 91-93 (2002)Detecting Obfuscated Viruses Using Cosine Similarity Analysis., , and . Asia International Conference on Modelling and Simulation, page 165-170. IEEE Computer Society, (2007)A Parameterized Analysis of Public-Key Protocols: Needham-Schroeder and Kerberos-5., , and . ICON, page 1-6. IEEE, (2006)