Sciweavers

2715 search results - page 443 / 543
» Database Publication Practices
Sort
View
152
Voted
ETS
2000
IEEE
154views Hardware» more  ETS 2000»
15 years 4 months ago
The Knowledge Depot: Building and Evaluating a Knowledge Management System
Organizations have long had the need to record and protect the knowledge that is their intellectual capital. However, the primary burden for knowledge management has been borne by...
Beatrix Zimmermann, Michael E. Atwood, Sabina Webb...
AMAI
1999
Springer
15 years 4 months ago
Logic Programs with Stable Model Semantics as a Constraint Programming Paradigm
Logic programming with the stable model semantics is put forward as a novel constraint programming paradigm. This paradigm is interesting because it bring advantages of logic prog...
Ilkka Niemelä
151
Voted
MSOM
2007
118views more  MSOM 2007»
15 years 4 months ago
What Can Be Learned from Classical Inventory Models? A Cross-Industry Exploratory Investigation
: Classical inventory models offer a variety of insights into the optimal way to manage inventories of individual products. However, top managers and industry analysts are often co...
Sergey Rumyantsev, Serguei Netessine
PR
2010
145views more  PR 2010»
15 years 3 months ago
Graph-optimized locality preserving projections
Locality preserving projections (LPP) is a typical graph-based dimensionality reduction (DR) method, and has been successfully applied in many practical problems such as face recog...
Limei Zhang, Lishan Qiao, Songcan Chen
SCN
2010
Springer
144views Communications» more  SCN 2010»
15 years 3 months ago
Generic Constructions of Parallel Key-Insulated Encryption
Exposure of a secret key is a significant threat in practice. As a notion of security against key exposure, Dodis et al. advocated key-insulated security, and proposed concrete k...
Goichiro Hanaoka, Jian Weng