Sciweavers

186 search results - page 33 / 38
» Disjunctions and Inheritance in the Context Feature Structur...
Sort
View
EL
2008
166views more  EL 2008»
14 years 11 months ago
The digital library as an enterprise: the Zachman approach
Purpose: Examines the needs of digital library stakeholders and how a collaborative digital library might be designed to meet these needs. The collaborative digital library has be...
Abdullah Abrizah, A. N. Zainab
IOR
2008
137views more  IOR 2008»
14 years 11 months ago
Optimal Joint Inventory and Transshipment Control Under Uncertain Capacity
In this paper, we address the optimal joint control of inventory and transshipment for a firm that produces in two locations and faces capacity uncertainty. Capacity uncertainty (...
Xinxin Hu, Izak Duenyas, Roman Kapuscinski
CISC
2009
Springer
174views Cryptology» more  CISC 2009»
14 years 9 months ago
Algebraic Side-Channel Attacks
Abstract. In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However...
Mathieu Renauld, François-Xavier Standaert
WWW
2007
ACM
16 years 8 days ago
Web object retrieval
The primary function of current Web search engines is essentially relevance ranking at the document level. However, myriad structured information about real-world objects is embed...
Zaiqing Nie, Yunxiao Ma, Shuming Shi, Ji-Rong Wen,...
TROB
2002
244views more  TROB 2002»
14 years 11 months ago
Distributed surveillance and reconnaissance using multiple autonomous ATVs: CyberScout
The objective of the CyberScout project is to develop an autonomous surveillance and reconnaissance system using a network of all-terrain vehicles. In this paper, we focus on two f...
Mahesh Saptharishi, C. Spence Oliver, Christopher ...