Sciweavers

6253 search results - page 459 / 1251
» Use Case Modeling Guidelines
Sort
View
AAAI
2007
15 years 7 months ago
Optimizing Anthrax Outbreak Detection Using Reinforcement Learning
The potentially catastrophic impact of a bioterrorist attack makes developing effective detection methods essential for public health. In the case of anthrax attack, a delay of ho...
Masoumeh T. Izadi, David L. Buckeridge
168
Voted
FORTE
2010
15 years 6 months ago
Grouping Nodes in Wireless Sensor Networks Using Coalitional Game Theory
Wireless sensor networks are typically ad-hoc networks of resource-constrained nodes; in particular, the nodes are limited in power resources. It can be difficult and costly to rep...
Fatemeh Kazemeyni, Einar Broch Johnsen, Olaf Owe, ...
LREC
2010
132views Education» more  LREC 2010»
15 years 6 months ago
Development and Use of an Evaluation Collection for Personalisation of Digital Newspapers
This paper presents the process of development and the characteristics of an evaluation collection for a personalisation system for digital newspapers. This system selects, adapts...
Alberto Díaz, Pablo Gervás, Antonio ...
154
Voted
DBSEC
2009
122views Database» more  DBSEC 2009»
15 years 6 months ago
An Approach to Security Policy Configuration Using Semantic Threat Graphs
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding a...
Simon N. Foley, William M. Fitzgerald
141
Voted
CCE
2008
15 years 5 months ago
Multiobjective optimization of multipurpose batch plants using superequipment class concept
We present a novel approach for solving different design problems related to single products in multipurpose batch plants: the selection of one production line out of several avai...
Andrej Mosat, Laurent Cavin, Ulrich Fischer 0002, ...