Sciweavers

4445 search results - page 753 / 889
» Reflective Authorization Systems
Sort
View
155
Voted
CCE
2005
15 years 3 months ago
Interactive evolutionary computation in process engineering
In practical system identification, process optimization and controller design, it is often desirable to simultaneously handle several objectives and constraints. In some cases, t...
János Madár, János Abonyi, Fe...
115
Voted
CE
2005
91views more  CE 2005»
15 years 3 months ago
Using data mining as a strategy for assessing asynchronous discussion forums
The purpose of this paper is to show how data mining may offer promise as a strategy for discovering and building alternative representations for the data underlying asynchronous ...
Laurie P. Dringus, Timothy Ellis
161
Voted
JSAC
2007
129views more  JSAC 2007»
15 years 3 months ago
Content-Aware Resource Allocation and Packet Scheduling for Video Transmission over Wireless Networks
— A cross-layer packet scheduling scheme that streams pre-encoded video over wireless downlink packet access networks to multiple users is presented. The scheme can be used with ...
Peshala V. Pahalawatta, Randall Berry, Thrasyvoulo...
130
Voted
ANOR
2004
122views more  ANOR 2004»
15 years 3 months ago
Call Center Staffing with Simulation and Cutting Plane Methods
We present an iterative cutting plane method for minimizing staffing costs in a service system subject to satisfying acceptable service level requirements over multiple time perio...
Júlíus Atlason, Marina A. Epelman, S...
130
Voted
COMPSEC
2004
104views more  COMPSEC 2004»
15 years 3 months ago
Formal support for certificate management policies
Traditionally, creation and revocation of certificates are governed by policies that are carried manually, off-line, by trusted agents. This approach to certificate management is ...
Victoria Ungureanu