Sciweavers

962 search results - page 111 / 193
» Near-optimal solutions for the generalized max-controlled se...
Sort
View
PODS
2011
ACM
163views Database» more  PODS 2011»
14 years 25 days ago
Provenance views for module privacy
Scientific workflow systems increasingly store provenance information about the module executions used to produce a data item, as well as the parameter settings and intermediate...
Susan B. Davidson, Sanjeev Khanna, Tova Milo, Debm...
ICLP
2004
Springer
15 years 3 months ago
Protein Folding Simulation in CCP
A protein is identified by a finite sequence of aminoacids, each of them chosen from a set of 20 elements. The Protein Structure Prediction Problem is the problem of predicting t...
Alessandro Dal Palù, Agostino Dovier, Feder...
CP
2005
Springer
15 years 3 months ago
Speeding Up Constrained Path Solvers with a Reachability Propagator
Constrained path problems have to do with finding paths in graphs subject to constraints. One way of constraining the graph is by enforcing reachability on nodes. For instance, i...
Luis Quesada, Peter Van Roy, Yves Deville
WSC
2000
14 years 11 months ago
An MSE-based simulation capability for strategic and tactical logistics
We have developed and applied modeling, simulation, and analysis capabilities for addressing strategic and tactical logistics problems in the chemical industry. These problems hav...
Charles R. Standridge, David R. Heltne
SIAMDM
2010
149views more  SIAMDM 2010»
14 years 8 months ago
Formal Theory of Noisy Sensor Network Localization
Graph theory has been used to characterize the solvability of the sensor network localization problem. If sensors correspond to vertices and edges correspond to sensor pairs betwee...
Brian D. O. Anderson, Iman Shames, Guoqiang Mao, B...