Sciweavers

650 search results - page 82 / 130
» Analysis and design of sequencing rules for car sequencing
Sort
View
FASE
2008
Springer
14 years 11 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
BIRTHDAY
2005
Springer
15 years 3 months ago
Expander2
Expander2 is a flexible multi-purpose workbench for interactive rewriting, verification, constraint solving, flow graph analysis and other procedures that build up proofs or co...
Peter Padawitz
TVCG
1998
160views more  TVCG 1998»
14 years 9 months ago
Adaptive Projection Operators in Multiresolution Scientific Visualization
—Recently, multiresolution visualization methods have become an indispensable ingredient of real-time interactive postprocessing. The enormous databases, typically coming along w...
Mario Ohlberger, Martin Rumpf
BIODATAMINING
2008
178views more  BIODATAMINING 2008»
14 years 10 months ago
Clustering-based approaches to SAGE data mining
Serial analysis of gene expression (SAGE) is one of the most powerful tools for global gene expression profiling. It has led to several biological discoveries and biomedical appli...
Haiying Wang, Huiru Zheng, Francisco Azuaje
WSC
2004
14 years 11 months ago
Impact of Production Run Length on Supply Chain Performance
This paper documents an experiment designed to show the value of simulation in understanding the relationship between production run lengths and overall supply chain performance. ...
David J. Parsons, Robin J. Clark, Kevin L. Payette