Sciweavers

781 search results - page 135 / 157
» Self-Organizing Operator Maps in Complex System Analysis
Sort
View
CAD
2005
Springer
14 years 11 months ago
Efficiency of boundary evaluation for a cellular model
Feature modeling systems usually employ a boundary representation (b-rep) to store the shape information on a product. It has, however, been shown that a b-rep has a number of sho...
Rafael Bidarra, Joaquim Madeira, Willem J. Neels, ...
ENVSOFT
2000
70views more  ENVSOFT 2000»
14 years 11 months ago
Modeling soil pile bioremediation
A model is presented for the analysis of bioremediation applied to an ex situ soil pile. The approach is based on the remediation of a pile containing the contaminated soil, which...
Fehmidakhatun A. Mesania, Aaron A. Jennings
GECCO
2005
Springer
15 years 5 months ago
Theme preservation and the evolution of representation
The identification of mechanisms by which constraints on phenotypic variability are tuned in nature, and the implementation of these mechanisms in Evolutionary Algorithms (EAs) ca...
Keki M. Burjorjee, Jordan B. Pollack
OTM
2009
Springer
15 years 6 months ago
Ontology-Driven Provenance Management in eScience: An Application in Parasite Research
Provenance, from the French word “provenir”, describes the lineage or history of a data entity. Provenance is critical information in scientific applications to verify experime...
Satya Sanket Sahoo, D. Brent Weatherly, Raghava Mu...
CCS
2006
ACM
15 years 3 months ago
Beyond separation of duty: an algebra for specifying high-level security policies
A high-level security policy states an overall requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires a sensi...
Ninghui Li, Qihua Wang