Sciweavers

88 search results - page 15 / 18
» Towards a Methodology for Designing E-Government Control Pro...
Sort
View
CCE
2008
15 years 14 days ago
Chance constrained programming approach to process optimization under uncertainty
Deterministic optimization approaches have been well developed and widely used in the process industry to accomplish off-line and on-line process optimization. The challenging tas...
Pu Li, Harvey Arellano-Garcia, Günter Wozny
116
Voted
CCS
2010
ACM
14 years 9 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
108
Voted
MOBISYS
2010
ACM
15 years 2 months ago
Anatomizing application performance differences on smartphones
The use of cellular data networks is increasingly popular due to the widespread deployment of 3G technologies and the rapid adoption of smartphones, such as iPhone and GPhone. Bes...
Junxian Huang, Qiang Xu, Birjodh Tiwana, Zhuoqing ...
ISBI
2006
IEEE
16 years 1 months ago
Automated super-resolution detection of fluorescent rods in 2D
We describe a method designed to detect fluorescent rods from 2D microscopy images. It is motivated by the desire to study the dynamics of bacteria such as Shigella. The methodolo...
Bo Zhang, Jost Enninga, Jean-Christophe Olivo-Mari...
93
Voted
WCE
2007
15 years 1 months ago
Human error of commission modeled with Theory of Games
— Industrial plants makes a carefully trace of the human intervention on the process. This intervention happens at different points in the history of the facility, since the desi...
Selva S. Rivera, Jorge E. Núñez Mc L...