Sciweavers

88 search results - page 15 / 18
» Towards a Methodology for Designing E-Government Control Pro...
Sort
View
118
Voted
CCE
2008
14 years 10 months ago
Chance constrained programming approach to process optimization under uncertainty
Deterministic optimization approaches have been well developed and widely used in the process industry to accomplish off-line and on-line process optimization. The challenging tas...
Pu Li, Harvey Arellano-Garcia, Günter Wozny
CCS
2010
ACM
14 years 7 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
MOBISYS
2010
ACM
15 years 17 days ago
Anatomizing application performance differences on smartphones
The use of cellular data networks is increasingly popular due to the widespread deployment of 3G technologies and the rapid adoption of smartphones, such as iPhone and GPhone. Bes...
Junxian Huang, Qiang Xu, Birjodh Tiwana, Zhuoqing ...
92
Voted
ISBI
2006
IEEE
15 years 11 months ago
Automated super-resolution detection of fluorescent rods in 2D
We describe a method designed to detect fluorescent rods from 2D microscopy images. It is motivated by the desire to study the dynamics of bacteria such as Shigella. The methodolo...
Bo Zhang, Jost Enninga, Jean-Christophe Olivo-Mari...
76
Voted
WCE
2007
14 years 11 months ago
Human error of commission modeled with Theory of Games
— Industrial plants makes a carefully trace of the human intervention on the process. This intervention happens at different points in the history of the facility, since the desi...
Selva S. Rivera, Jorge E. Núñez Mc L...