Searched for: subject%3A%22breach%22
(1 - 1 of 1)
document
Peeters, P. (author), Van Hoestenberghe, T. (author), Vincke, L. (author), Visser, P.J. (author)
The use of breach models includes two tasks: predicting breach characteristics and estimating flow through the breach. Strengths and weaknesses as well as opportunities and threats of different simplified and detailed physically-based breach models are listed following theoretical and practical criteria. According to the theoretical criteria,...
conference paper 2011