Sciweavers

5722 search results - page 1013 / 1145
» Security Function Interactions
Sort
View
ITSSA
2006
97views more  ITSSA 2006»
15 years 3 months ago
Service Evolution in Bio-Inspired Communication Systems
: An autonomic network must work unsupervised, therefore must be able to respond to unpredictable situations. The BIONETS project is working towards resilient network services that...
Daniele Miorandi, Lidia Yamamoto, Paolo Dini
JCC
2006
58views more  JCC 2006»
15 years 3 months ago
On the reversible O2 binding of the Fe-porphyrin complex
: Electronic mechanism of the reversible O2 binding by heme was studied by using Density Functional Theory calculations. The ground state of oxyheme was calculated to be open singl...
Hiroyuki Nakashima, Jun-Ya Hasegawa, Hiroshi Nakat...
JCM
2006
135views more  JCM 2006»
15 years 3 months ago
Bandwidth Allocation and Session Scheduling using SIP
Session Initiation Protocol (SIP) is a new signaling protocol designed to establish multimedia sessions in telecommunication networks. In this paper, we suggest the extension of SI...
Hassan Hassan 0002, Jean-Marie Garcia, Olivier Bru...
140
Voted
JIIS
2006
119views more  JIIS 2006»
15 years 3 months ago
Answering constraint-based mining queries on itemsets using previous materialized results
Abstract In recent years, researchers have begun to study inductive databases, a new generation of databases for leveraging decision support applications. In this context, the user...
Roberto Esposito, Rosa Meo, Marco Botta
MANSCI
2008
128views more  MANSCI 2008»
15 years 3 months ago
Optimizing Call Center Staffing Using Simulation and Analytic Center Cutting-Plane Methods
We consider the problem of minimizing staffing costs in an inbound call center, while maintaining an acceptable level of service in multiple time periods. The problem is complicat...
Júlíus Atlason, Marina A. Epelman, S...
« Prev « First page 1013 / 1145 Last » Next »