Sciweavers

4266 search results - page 313 / 854
» The container loading problem
Sort
View
CCS
2007
ACM
15 years 11 months ago
Direct static enforcement of high-level security policies
A high-level security policy states an overall safety requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires ...
Qihua Wang, Ninghui Li
CPM
2007
Springer
101views Combinatorics» more  CPM 2007»
15 years 11 months ago
Improved Algorithms for Inferring the Minimum Mosaic of a Set of Recombinants
Abstract. Detecting historical recombination is an important computational problem which has received great attention recently. Due to recombination, input sequences form a mosaic,...
Yufeng Wu, Dan Gusfield
CPM
2007
Springer
102views Combinatorics» more  CPM 2007»
15 years 11 months ago
Non-breaking Similarity of Genomes with Gene Repetitions
Abstract. In this paper we define a new similarity measure, the nonbreaking similarity, which is the complement of the famous breakpoint distance between genomes (in general, betw...
Zhixiang Chen, Bin Fu, Jinhui Xu, Bo-Ting Yang, Zh...
ICTAI
2003
IEEE
15 years 10 months ago
S-MEP: A Planner for Numeric Goals
Planning for numeric goals is an important problem. Only one of the many participants from the 2002 international planning competition (Metric-FF) can effectively handle problems ...
Javier Sanchez, Amol Dattatraya Mali
JCDL
2003
ACM
80views Education» more  JCDL 2003»
15 years 10 months ago
Repository Synchronization in the OAI Framework
The Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH) began as an alternative to distributed searching of scholarly eprint repositories. The model embraced by th...
Xiaoming Liu 0005, Kurt Maly, Mohammad Zubair, Mic...