- document
-
Peeters, P. (author), Van Hoestenberghe, T. (author), Vincke, L. (author), Visser, P.J. (author)The use of breach models includes two tasks: predicting breach characteristics and estimating flow through the breach. Strengths and weaknesses as well as opportunities and threats of different simplified and detailed physically-based breach models are listed following theoretical and practical criteria. According to the theoretical criteria,...conference paper 2011