Sciweavers

1712 search results - page 249 / 343
» Abstract Constraint Data Types
Sort
View
FGCS
2008
159views more  FGCS 2008»
14 years 11 months ago
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. Thi...
Hua Wang, Yanchun Zhang, Jinli Cao
EOR
2006
129views more  EOR 2006»
14 years 11 months ago
Balancing assembly lines with tabu search
Balancing assembly lines is a crucial task for manufacturing companies in order to improve productivity and minimize production costs. Despite some progress in exact methods to so...
Sophie D. Lapierre, Angel B. Ruiz, Patrick Soriano
IJMMS
2008
68views more  IJMMS 2008»
14 years 11 months ago
Mobile technologies in mobile spaces: Findings from the context of train travel
Whilst mobile work is increasingly prevalent, there is little detailed study of this phenomenon in the specific context of a train. Thus, the current study focuses on how mobile w...
Carolyn M. Axtell, Donald Hislop, Steve Whittaker
TON
2008
86views more  TON 2008»
14 years 11 months ago
Securing user-controlled routing infrastructures
Designing infrastructures that give untrusted third parties (such as end-hosts) control over routing is a promising research direction for achieving flexible and efficient communic...
Karthik Lakshminarayanan, Daniel Adkins, Adrian Pe...
TSE
2008
128views more  TSE 2008»
14 years 11 months ago
Analyzing Regulatory Rules for Privacy and Security Requirements
Information practices that use personal, financial, and health-related information are governed by US laws and regulations to prevent unauthorized use and disclosure. To ensure com...
Travis D. Breaux, Annie I. Antón