Sciweavers

4445 search results - page 753 / 889
» Reflective Authorization Systems
Sort
View
CCE
2005
14 years 10 months ago
Interactive evolutionary computation in process engineering
In practical system identification, process optimization and controller design, it is often desirable to simultaneously handle several objectives and constraints. In some cases, t...
János Madár, János Abonyi, Fe...
CE
2005
91views more  CE 2005»
14 years 10 months ago
Using data mining as a strategy for assessing asynchronous discussion forums
The purpose of this paper is to show how data mining may offer promise as a strategy for discovering and building alternative representations for the data underlying asynchronous ...
Laurie P. Dringus, Timothy Ellis
JSAC
2007
129views more  JSAC 2007»
14 years 10 months ago
Content-Aware Resource Allocation and Packet Scheduling for Video Transmission over Wireless Networks
— A cross-layer packet scheduling scheme that streams pre-encoded video over wireless downlink packet access networks to multiple users is presented. The scheme can be used with ...
Peshala V. Pahalawatta, Randall Berry, Thrasyvoulo...
ANOR
2004
122views more  ANOR 2004»
14 years 10 months ago
Call Center Staffing with Simulation and Cutting Plane Methods
We present an iterative cutting plane method for minimizing staffing costs in a service system subject to satisfying acceptable service level requirements over multiple time perio...
Júlíus Atlason, Marina A. Epelman, S...
87
Voted
COMPSEC
2004
104views more  COMPSEC 2004»
14 years 10 months ago
Formal support for certificate management policies
Traditionally, creation and revocation of certificates are governed by policies that are carried manually, off-line, by trusted agents. This approach to certificate management is ...
Victoria Ungureanu