Sciweavers

8109 search results - page 1275 / 1622
» A Model of Component-Based Programming
Sort
View
138
Voted
MP
2008
99views more  MP 2008»
15 years 4 months ago
Compact formulations as a union of polyhedra
We explore one method for finding the convex hull of certain mixed integer sets. The approach is to break up the original set into a small number of subsets, find a compact polyhed...
Michele Conforti, Laurence A. Wolsey
150
Voted
MSCS
2008
97views more  MSCS 2008»
15 years 4 months ago
Logical relations for monadic types
Abstract. Software security can be ensured by specifying and verifying security properties of software using formal methods with strong theoretical bases. In particular, programs c...
Jean Goubault-Larrecq, Slawomir Lasota, David Nowa...
127
Voted
EOR
2007
89views more  EOR 2007»
15 years 4 months ago
Managing a portfolio of long term service agreements
Long-term service agreements (LTSA) for the maintenance of capital-intensive equipment such as gas turbines and aircraft engines are gaining wide acceptance. A typical LTSA contra...
Srinivas Bollapragada, Aparna Gupta, Chaipat Lawsi...
201
Voted
NGC
2006
Springer
15 years 4 months ago
The Transformational Creativity Hypothesis
The work of Boden on the nature of creativity has been extremely influential, particularly the hypothesis that the highest form of creativity results from transformation of a conce...
Graeme Ritchie
132
Voted
TSP
2008
107views more  TSP 2008»
15 years 4 months ago
Opportunistic Spectrum Access via Periodic Channel Sensing
The problem of opportunistic access of parallel channels occupied by primary users is considered. Under a continuous-time Markov chain modeling of the channel occupancy by the prim...
Qing Zhao, Stefan Geirhofer, Lang Tong, Brian M. S...
« Prev « First page 1275 / 1622 Last » Next »