Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
547
search results - page 16 / 110
»
Preference-Based Search for Scheduling
Sort
relevance
views
votes
recent
update
View
thumb
title
50
click to vote
INFORMATICASI
2008
62
views
more
INFORMATICASI 2008
»
A Heuristic Search Algorithm for Flow-Shop Scheduling
14 years 11 months ago
Download
www.informatica.si
Joshua Poh-Onn Fan, Graham K. Winley
claim paper
Read More »
34
click to vote
CORR
2007
Springer
80
views
Education
»
more
CORR 2007
»
A Greedy Randomized Adaptive Search Procedure for Technicians and Interventions Scheduling for Telecommunications
14 years 11 months ago
Download
www.g-scop.inpg.fr
Sylvain Boussier, Hideki Hashimoto, Michel Vasquez
claim paper
Read More »
42
Voted
IOR
2006
40
views
more
IOR 2006
»
Optimizing Chemotherapy Scheduling Using Local Search Heuristics
14 years 11 months ago
Download
www.math.tau.ac.il
Zvia Agur, Refael Hassin, Sigal Levy
claim paper
Read More »
73
click to vote
AIM
1998
72
views
Software Engineering
»
more
AIM 1998
»
A Generic Framework for Constraint-Directed Search and Scheduling
14 years 10 months ago
Download
www.eil.utoronto.ca
J. Christopher Beck, Mark S. Fox
claim paper
Read More »
68
click to vote
VMCAI
2004
Springer
96
views
Software Engineering
»
more
VMCAI 2004
»
History-Dependent Scheduling for Cryptographic Processes
15 years 4 months ago
Download
www.it.uu.se
Abstract. This paper presents history-dependent scheduling, a new technique for reducing the search space in the verification of cryptographic protocols. This technique allows the...
Vincent Vanackère
claim paper
Read More »
« Prev
« First
page 16 / 110
Last »
Next »