Sciweavers

2006 search results - page 70 / 402
» Heuristic Security-Testing Methods
Sort
View
89
Voted
ICRA
1999
IEEE
114views Robotics» more  ICRA 1999»
15 years 4 months ago
An Effective Method to Reduce Inventory in Job Shops
Inventory plays a major role in deciding the overall manufacturing costs, and a good scheduling system should balance the on-time delivery of products versus low work-in-process (W...
Peter B. Luh, Xiaohui Zhou, Robert N. Tomastik
ISPAN
1997
IEEE
15 years 4 months ago
A method for estimating optimal unrolling times for nested loops
Loop unrolling is one of the most promising parallelization techniques, because the nature of programs causes most of the processing time to be spent in their loops. Unrolling not...
Akira Koseki, Hideaki Komatsu, Yoshiaki Fukazawa
VLDB
1991
ACM
122views Database» more  VLDB 1991»
15 years 4 months ago
An Iterative Method for Distributed Database Design
The development of a distributed database systemrequires effective solutions to many complex and interrelated design problems. The cost dependenciesbetween query optimization and ...
Rex Blankinship, Alan R. Hevner, S. Bing Yao
WETICE
2000
IEEE
15 years 5 months ago
The Mechanics of Collaboration: Developing Low Cost Usability Evaluation Methods for Shared Workspaces
We introduce a conceptual framework that articulates the mechanics of collaboration for shared-workspace groupware: the low level actions and interactions that must be carried out...
Carl Gutwin, Saul Greenberg
MP
2006
90views more  MP 2006»
15 years 16 days ago
Solving multistage asset investment problems by the sample average approximation method
The vast size of real world stochastic programming instances requires sampling to make them practically solvable. In this paper we extend the understanding of how sampling affects ...
Jörgen Blomvall, Alexander Shapiro