Sciweavers

3031 search results - page 376 / 607
» Investigating human-computer optimization
Sort
View
123
Voted
WSC
2008
15 years 6 months ago
Supply chain risks analysis by using jump-diffusion model
This paper investigates the effects of demand risk on the performance of supply chain in continuous time setting. The inventory level has been modeled as a jump-diffusion process ...
Xianzhe Chen, Jun Zhang
131
Voted
ASPDAC
2008
ACM
129views Hardware» more  ASPDAC 2008»
15 years 5 months ago
Clock tree synthesis with data-path sensitivity matching
This paper investigates methods for minimizing the impact of process variation on clock skew using buffer and wire sizing. While most papers on clock trees ignore data-path circuit...
Matthew R. Guthaus, Dennis Sylvester, Richard B. B...
149
Voted
CARDIS
2008
Springer
146views Hardware» more  CARDIS 2008»
15 years 5 months ago
Provably Secure Grouping-Proofs for RFID Tags
We investigate an application of RFIDs referred to in the literature as group scanning, in which several tags are "simultaneously" scanned by a reader device. Our goal is...
Mike Burmester, Breno de Medeiros, Rossana Motta
149
Voted
CIKM
2008
Springer
15 years 5 months ago
Scalable complex pattern search in sequential data
Searching data streams has been traditionally very limited, either in the complexity of the search or in the size of the searched dataset. In this paper, we investigate the design...
Leila Kaghazian, Dennis McLeod, Reza Sadri
141
Voted
CISS
2008
IEEE
15 years 5 months ago
Client-centric fractional frequency reuse based on user cooperation in OFDMA networks
Abstract--This paper proposes client-centric fractional frequency reuse (CC-FFR) techniques for interference mitigation in OFDMA-based cellular wireless networks. In this framework...
Stefan Geirhofer, Ozgur Oyman