Sciweavers

164 search results - page 12 / 33
» How to Model Operational Risk If You Must
Sort
View
WSC
2000
14 years 11 months ago
Using simulation and critical points to define states in continuous search spaces
Many artificial intelligence techniques rely on the notion ate" as an abstraction of the actual state of the nd an "operator" as an abstraction of the actions that ...
Marc S. Atkin, Paul R. Cohen
61
Voted
MSOM
2010
77views more  MSOM 2010»
14 years 8 months ago
To Wave or Not to Wave? Order Release Policies for Warehouses with an Automated Sorter
Wave-based release policies are prevalent in warehouses with an automated sorter, and take different forms depending on how much waves overlap and whether the sorter is split for...
Jérémie Gallien, Théophane We...
89
Voted
SOSE
2008
IEEE
15 years 4 months ago
Model-Checking of Web Services Choreography
Abstract Web services choreography describes the global model of service interactions among a set of participants. In order to achieve a common business goal, the protocols of inte...
Hongli Yang, Xiangpeng Zhao, Chao Cai, Zongyan Qiu
JCIT
2010
148views more  JCIT 2010»
14 years 5 months ago
Investigating the Performance of Naive- Bayes Classifiers and K- Nearest Neighbor Classifiers
Probability theory is the framework for making decision under uncertainty. In classification, Bayes' rule is used to calculate the probabilities of the classes and it is a bi...
Mohammed J. Islam, Q. M. Jonathan Wu, Majid Ahmadi...
PERVASIVE
2007
Springer
15 years 4 months ago
Virtual Walls: Protecting Digital Privacy in Pervasive Environments
As pervasive environments become more commonplace, the privacy of users is placed at increased risk. The numerous and diverse sensors in these environments can record users’ cont...
Apu Kapadia, Tristan Henderson, Jeffrey J. Fieldin...