Sciweavers

8377 search results - page 203 / 1676
» Scenarios - Introduction
Sort
View
161
Voted
CORR
2007
Springer
131views Education» more  CORR 2007»
15 years 4 months ago
Cognitive Medium Access: Exploration, Exploitation and Competition
—This paper considers the design of efficient strategies that allow cognitive users to choose frequency bands to sense and access among multiple bands with unknown parameters. F...
Lifeng Lai, Hesham El Gamal, Hai Jiang, H. Vincent...
ITSSA
2006
182views more  ITSSA 2006»
15 years 4 months ago
Evaluation of a Multi-Agent System for Hospital Patient Scheduling
: The problem of patient scheduling in hospitals is characterized by high uncertainty and dynamics in patient treatments. Additional complexity in the planning and coordination pro...
Anja Zöller, Lars Braubach, Alexander Pokahr,...
145
Voted
EOR
2007
88views more  EOR 2007»
15 years 4 months ago
The stochastic location model with risk pooling
In this paper, we present a stochastic version of the Location Model with Risk Pooling (LMRP) that optimizes location, inventory, and allocation decisions under random parameters ...
Lawrence V. Snyder, Mark S. Daskin, Chung-Piaw Teo
126
Voted
EOR
2007
68views more  EOR 2007»
15 years 4 months ago
Multiattribute electronic procurement using goal programming
One of the key challenges of current day electronic procurement systems is to enable procurement decisions transcend beyond a single attribute such as cost. Consequently, multiatt...
S. Kameshwaran, Y. Narahari, Charles H. Rosa, Deva...
122
Voted
IJSN
2007
73views more  IJSN 2007»
15 years 4 months ago
Optimal worm-scanning method using vulnerable-host distributions
: Most Internet worms use random scanning. The distribution of vulnerable hosts on the Internet, however, is highly non-uniform over the IP-address space. This implies that random ...
Zesheng Chen, Chuanyi Ji