Sciweavers

3516 search results - page 565 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
WSC
1998
15 years 5 months ago
Use of Simulation in Optimization of Maintenance Policies
Selecting an optimum maintenance policy independent of other parameters of the production system does not always yield the overall optimum operating conditions. For instance, high...
Farhad Azadivar, J. Victor Shu
CCE
2011
14 years 11 months ago
Development and validation of a dynamic model for regeneration of passivating baths using membrane contactors
Selective liquid membranes have been traditionally employed for liquid/liquid and gas/liquid mass transfer in a wide range of applications. In particular, the Emulsion Pertraction...
Eugenio Bringas, Rosa Mediavilla, Ana María...
DATE
2002
IEEE
131views Hardware» more  DATE 2002»
15 years 9 months ago
Passive Constrained Rational Approximation Algorithm Using Nevanlinna-Pick Interpolation
As system integration evolves and tighter design constraints must be met, it becomes necessary to account for the non-ideal behavior of all the elements in a system. For high-spee...
Carlos P. Coelho, Luis Miguel Silveira, Joel R. Ph...
HT
2003
ACM
15 years 9 months ago
HyperReal: a hypermedia model for mixed reality
This paper describes a generic hypermedia model that is used as a framework for building context aware and mixed reality applications. It can handle different media elements, and ...
Luís Romero, Nuno Correia
CIKM
2008
Springer
15 years 6 months ago
Ranked feature fusion models for ad hoc retrieval
We introduce the Ranked Feature Fusion framework for information retrieval system design. Typical information retrieval formalisms such as the vector space model, the bestmatch mo...
Jeremy Pickens, Gene Golovchinsky