Sciweavers

31 search results - page 6 / 7
» Involutively Bordered Words
Sort
View
ISSA
2004
14 years 11 months ago
A Logic-Based Access Control Approach For Web Services
Web Services technology enables organisations to exploit software as a service. Services are accessed by method invocations. Method interfaces are described and published, and may...
Marijke Coetzee
CN
2007
96views more  CN 2007»
14 years 9 months ago
Persistent detection and recovery of state inconsistencies
Soft-state is a well established approach to designing robust network protocols and applications. However it is unclear how to apply soft-state approach to protocols that must mai...
Lan Wang, Daniel Massey, Lixia Zhang
IIE
2006
110views more  IIE 2006»
14 years 9 months ago
The Current Situation of Informatics Education in Mongolia
Mongolia started using Information and Communication Technology (ICT) in secondary education relatively late. The computer training and informatics has been included as a subject i...
Uyanga Sambuu
92
Voted
JDA
2008
84views more  JDA 2008»
14 years 9 months ago
Red-blue covering problems and the consecutive ones property
Set Cover problems are of core importance in many applications. In recent research, the "red-blue variants" where blue elements all need to be covered whereas red elemen...
Michael Dom, Jiong Guo, Rolf Niedermeier, Sebastia...
EOR
2011
127views more  EOR 2011»
14 years 4 months ago
Methodology for determining the acceptability of system designs in uncertain environments
In practice, managers often wish to ascertain that a particular engineering design of a production system meets their requirements. The future environment of this design is likely...
Jack P. C. Kleijnen, Henri Pierreval, Jin Zhang