Sciweavers

3686 search results - page 481 / 738
» Comprehensive comprehensions
Sort
View
WSC
2007
15 years 6 months ago
Flexible modeling of linear schedules for integrated mathematical analysis
Developing and analyzing schedules is essential for successfully controlling the time aspect of construction projects. The critical path method of scheduling is by far the most wi...
Gunnar Lucko
APNOMS
2008
Springer
15 years 6 months ago
Application of Data Mining to Network Intrusion Detection: Classifier Selection Model
As network attacks have increased in number and severity over the past few years, intrusion detection system (IDS) is increasingly becoming a critical component to secure the netwo...
Huy Anh Nguyen, Deokjai Choi
EDBT
2010
ACM
185views Database» more  EDBT 2010»
15 years 6 months ago
BP-Ex: a uniform query engine for business process execution traces
Many enterprises nowadays use business processes, based on the BPEL standard, to achieve their goals. Analyzing the execution of such processes is critical for enforcing business ...
Eran Balan, Tova Milo, Tal Sterenzy
ASIACRYPT
2008
Springer
15 years 6 months ago
Limits of Constructive Security Proofs
The collision-resistance of hash functions is an important foundation of many cryptographic protocols. Formally, collision-resistance can only be expected if the hash function in f...
Michael Backes, Dominique Unruh
ASSETS
2008
ACM
15 years 6 months ago
Computer vision-based clear path guidance for blind wheelchair users
We describe a system for guiding blind and visually impaired wheelchair users along a clear path that uses computer vision to sense the presence of obstacles or other terrain feat...
Volodymyr Ivanchenko, James Coughlan, William Gerr...