Sciweavers

10055 search results - page 1446 / 2011
» Structured programming using processes
Sort
View
DBSEC
1996
125views Database» more  DBSEC 1996»
15 years 6 months ago
A Framework for High Assurance Security of Distributed Objects
High assurance security is di cult to achieve in distributed computer systems and databases because of their complexity, non-determinism and inherent heterogeneity. The practical ...
John Hale, Jody Threet, Sujeet Shenoi
CORR
2008
Springer
132views Education» more  CORR 2008»
15 years 5 months ago
Building Better Nurse Scheduling Algorithms
The aim of this research is twofold: Firstly, to model and solve a complex nurse scheduling problem with an integer programming formulation and evolutionary algorithms. Secondly, ...
Uwe Aickelin, Paul White
ENTCS
2008
118views more  ENTCS 2008»
15 years 5 months ago
Barbed Model-Driven Software Development: A Case Study
When thinking of MDE, the immediate understanding is that models drive software development, in the at the software is constructed by transforming models from higher levels of abs...
Carlo Montangero, Laura Semini
125
Voted
ECOI
2006
59views more  ECOI 2006»
15 years 4 months ago
Model-building with interpolated temporal data
Ecological data can be difficult to collect, and as a result, some important temporal ecological datasets contain irregularly sampled data. Since many temporal modelling technique...
Robert I. McKay, Tuan Hao Hoang, Naoki Mori, Nguye...
JMM2
2006
80views more  JMM2 2006»
15 years 4 months ago
Implementing Holistic Dimensions for a Facial Composite System
Facial composites are pictures of human faces. These are normally constructed by victims and witnesses of crime who describe a suspect's face and then select individual facial...
Charlie D. Frowd, Vicki Bruce, Alex H. McIntyre, D...
« Prev « First page 1446 / 2011 Last » Next »