Skip to main content
Search form
Main menu
HOME
DIRECTORY
RESEARCH
COLLABORATIVE ENVIRONMENTS
CYBER SECURITY
BIG DATA MANAGEMENT
DATA MINING
GEOINFORMATICS
MOBILE APPLICATIONS
MODELING, SIMULATION AND ANALYSIS
SEMANTICS
SENSOR NETWORKS
VISUALIZATION
REAL TIME DATA
PROJECTS
CURRENT
HISTORICAL
PRODUCTS
OUTREACH
PUBLICATIONS and PRESENTATIONS
POSTERS
BROCHURES
ABOUT US
PROFESSIONAL
CAREERS
A Case Study of the Use of Design of Experiments Methods to Calibrate a Semi-Automated Forces System
Foster KL
,
Petty MD
.
A Case Study of the Use of Design of Experiments Methods to Calibrate a Semi-Automated Forces System
. 2019 ACM Southeast Conference. 2019 :133-140.
Read more
about A Case Study of the Use of Design of Experiments Methods to Calibrate a Semi-Automated Forces System
Google Scholar
DOI
Component-based Implementation of Cyberattack Simulation Models
Mayfield KP
,
Petty MD
,
Whitaker TS
,
Bland JA
,
Cantrell WA
.
Component-based Implementation of Cyberattack Simulation Models
. 2019 ACM Southeast Conference. 2019 :64-71.
Read more
about Component-based Implementation of Cyberattack Simulation Models
Google Scholar
DOI
Applying Reinforcement Learning to Plan Manufacturing Material Handling, Part 1: Background and Formal Problem Specification
Govindaiah S
,
Petty MD
.
Applying Reinforcement Learning to Plan Manufacturing Material Handling, Part 1: Background and Formal Problem Specification
. 2019 ACM Southeast Conference. 2019 :168-171.
Read more
about Applying Reinforcement Learning to Plan Manufacturing Material Handling, Part 1: Background and Formal Problem Specification
Google Scholar
DOI
Applying Reinforcement Learning to Plan Manufacturing Material Handling, Part 2: Experimentation and Results
Govindaiah S
,
Petty MD
.
Applying Reinforcement Learning to Plan Manufacturing Material Handling, Part 2: Experimentation and Results
. 2019 ACM Southeast Conference. 2019 :16-23.
Read more
about Applying Reinforcement Learning to Plan Manufacturing Material Handling, Part 2: Experimentation and Results
Google Scholar
DOI
A Technique to Enable Online Machine Learning Applications for Simulation Optimization
Garrison WT
,
Petty MD
.
A Technique to Enable Online Machine Learning Applications for Simulation Optimization
. 2019 IEEE SoutheastCon. 2019 .
Read more
about A Technique to Enable Online Machine Learning Applications for Simulation Optimization
Google Scholar
A Comparison of Simulation Optimization Algorithm Performance
Garrison WT
,
Petty MD
.
A Comparison of Simulation Optimization Algorithm Performance
. 2019 IEEE SoutheastCon. 2019 .
Read more
about A Comparison of Simulation Optimization Algorithm Performance
Google Scholar
An Analysis of Machine Learning Online Training Approaches for Simulation Optimization
Garrison WT
,
Petty MD
.
An Analysis of Machine Learning Online Training Approaches for Simulation Optimization
. 2019 IEEE SoutheastCon. 2019 .
Read more
about An Analysis of Machine Learning Online Training Approaches for Simulation Optimization
Google Scholar
A Monte Carlo Algorithm for Generating Synthetic Social Networks Based on Personality Compatibility
O’Neil DA
,
Petty MD
.
A Monte Carlo Algorithm for Generating Synthetic Social Networks Based on Personality Compatibility
. 2019 IEEE SoutheastCon. 2019 .
Read more
about A Monte Carlo Algorithm for Generating Synthetic Social Networks Based on Personality Compatibility
Google Scholar
Machine Learning Cyberattack Strategies with Petri Nets with Players, Strategies, and Costs
Bland JA
,
Colvett CD
,
Cantrell WA
,
Mayfield KP
,
Petty MD
,
Whitaker TS
.
Machine Learning Cyberattack Strategies with Petri Nets with Players, Strategies, and Costs
. 2019 National Cyber Summit. 2019 :1-16.
Read more
about Machine Learning Cyberattack Strategies with Petri Nets with Players, Strategies, and Costs
Google Scholar
DOI
Component Selection Process in Assembling Cyberattack Simulation Models
Mayfield KP
,
Petty MD
,
Whitaker TS
,
Cantrell WA
,
Hice SM
,
McClendon J
,
Reyes PJ
.
Component Selection Process in Assembling Cyberattack Simulation Models
. 2019 International Conference on Security and Management. 2019 :168-174.
Read more
about Component Selection Process in Assembling Cyberattack Simulation Models
Google Scholar
Pages
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »