9th Annual Review of Progress in Applied Computational Electromagnetics at the Naval Postgraduate School, Monterey, CA, March 22-26, 1993, Conference Proceedings
MetadataShow full item record
Major topics of this conference include: (1) Canonical Problems for Software Validation; (2) Canonical Problems Workshop; (3) Moment Method Theory and Applications; (4) GTD/JTD/PO Analysis; (5) Computational Electromagnetics - The Next Generation; (6) Transients; (7) High-frequency Techniques and Asymptotic Solutions; (8) visualization and I/O Issues; (9) Microwave Circuits; (10) Time-Domain Techniques 1 (featuring FDTD); (11) Remote Sensing and Monte Carlo Techniques; (12) Bioelectromagnetic Computations; (13) Time-Domain Techniques 2 (featuring TLM); (14) General Purpose Code Applications; (15) CAEME; (16) RCS; (17) Multipole Techniques; (18) Numerical Modeling in Complex Media; (19) Low-Frequency Techniques and Applications; (20) EMC/EMI; (21) Antennas; (22) Finite Element Method and Applications at High Frequencies.
Showing items related by title, author, creator and subject.
Tas, Volkan (Monterey, California. Naval Postgraduate School, 2012-09);Emitter location finding enables important functionality for both military and civilian applications. GPS is the most recognized and widely used positioning system, but it is a receiver location system that functions in a ...
7th Annual Review of Progress in Applied Computational Electromagnetics at the Naval Postgraduate School, Monterey, CA, March 18-22, 1991, Conference Proceedings Unknown author (Monterey, California. Naval Postgraduate School, 1991-03);Contents: User Interfaces and PC Applications for EM Modeling Codes; Caeme Special Session on Computer Applications in Electromagnetic Education; Inverse Problem Solutions; Asymptotic Solutions; New Techniques; Finite ...
San Miguel, John M.; Kline, Megan E.M.; Hallman, Roger A.; Slayback, Scott M.; Rogers, Alexis; Chang, Stefanie S.F. (2018);Malware mitigation for mobile technology is a long-standing problem for which there is not yet a good solution. In this paper, we focus on identifying malicious applications, and verifying the absence of malicious or ...