Sciweavers

5119 search results - page 982 / 1024
» Security Privacy
Sort
View
120
Voted
DKE
2007
75views more  DKE 2007»
15 years 3 months ago
Weaving temporal and reliability aspects into a schema tapestry
In aspect-oriented programming (AOP) a cross-cutting concern is implemented in an aspect. An aspect weaver blends code from the aspect into a program’s code at programmer-specifi...
Curtis E. Dyreson, Richard T. Snodgrass, Faiz Curr...
SIGCSE
2008
ACM
128views Education» more  SIGCSE 2008»
15 years 3 months ago
Cybercivics: a novel approach to reaching k-12 students with the social relevance of computer science
This paper describes CyberCivics, a novel approach to computer science outreach that integrates hands-on computing experiences with the study of contemporary social and political ...
Jim Owens, Jeanna Matthews
MOR
2010
115views more  MOR 2010»
14 years 10 months ago
Directional Derivatives of Oblique Reflection Maps
Given an oblique reflection map and functions , Dlim (the space of functions that have left and right limits at every point), the directional derivative () of along , evaluate...
Avi Mandelbaum, Kavita Ramanan
112
Voted
MP
2010
92views more  MP 2010»
14 years 10 months ago
Single item lot-sizing with non-decreasing capacities
We consider the single item lot-sizing problem with capacities that are non-decreasing over time. When the cost function is i) non-speculative or Wagner-Whitin (for instance, cons...
Yves Pochet, Laurence A. Wolsey
141
Voted
MP
2010
163views more  MP 2010»
14 years 10 months ago
Speeding up IP-based algorithms for constrained quadratic 0-1 optimization
In many practical applications, the task is to optimize a non-linear objective function over the vertices of a well-studied polytope as, e.g., the matching polytope or the travelli...
Christoph Buchheim, Frauke Liers, Marcus Oswald