Sciweavers

10907 search results - page 252 / 2182
» Constraint Based Strategies
Sort
View
CIS
2008
Springer
15 years 1 months ago
A Near-Optimal Redundancy Allocation Strategy that Minimizes a System's Vulnerability to Hazardous Events and Malicious Attacks
Delivering continuous services in information infrastructures is a major challenge. For system or network administrators, redundancy allocation is one of the best strategies to en...
Frank Yeong-Sung Lin, Po-Hao Tsang, Kun-Dao Jiang
UAI
2008
15 years 14 days ago
Strategy Selection in Influence Diagrams using Imprecise Probabilities
This paper describes a new algorithm to solve the decision making problem in Influence Diagrams based on algorithms for credal networks. Decision nodes are associated to imprecise...
Cassio Polpo de Campos, Qiang Ji
87
Voted
ECIS
2004
15 years 14 days ago
Business architecture: a new paradigm to relate e-business strategy to ICT
In this paper we address the concept of business architecture. We explain the concept and, based on a case study, discuss its relevance, operation, relationship with strategy and ...
Gerrit Versteeg, Harry Bouwman
WSC
2004
15 years 13 days ago
You Are Going to Teach Simulation - Now What? Tips and Strategies
Facing the prospect of teaching a simulation course for the first time can be a bit overwhelming. This panel shares tips and strategies for teaching simulation based upon a wide v...
Michael Freimer, Lee W. Schruben, Theresa M. Roede...
CORR
2010
Springer
66views Education» more  CORR 2010»
14 years 11 months ago
Query strategy for sequential ontology debugging
Abstract. Debugging is an important prerequisite for the wide-spread application of ontologies, especially in areas that rely upon everyday users to create and maintain knowledge b...
Kostyantyn M. Shchekotykhin, Gerhard Friedrich