Sciweavers

3911 search results - page 696 / 783
» Using Operational Architecture to Model Embedded Software
Sort
View
ESWA
2011
230views Database» more  ESWA 2011»
14 years 11 months ago
Multi-objective genetic algorithms for scheduling of radiotherapy treatments for categorised cancer patients
This paper presents a multi-objective optimisation model and algorithms for scheduling of radiotherapy treatments for categorised cancer patients. The model is developed considerin...
Dobrila Petrovic, Mohammad Morshed, Sanja Petrovic
CIDR
2009
129views Algorithms» more  CIDR 2009»
15 years 6 months ago
Extracting and Querying a Comprehensive Web Database
Recent research in domain-independent information extraction holds the promise of an automatically-constructed structured database derived from the Web. A query system based on th...
Michael J. Cafarella
TPDS
2002
112views more  TPDS 2002»
15 years 4 months ago
Performance Analysis of a Distributed Question/Answering System
The problem of question/answering (Q/A) is to find answers to open-domain questions by searching large collections of documents. Unlike information retrieval systems, very common ...
Mihai Surdeanu, Dan I. Moldovan, Sanda M. Harabagi...
GAMESEC
2011
287views Game Theory» more  GAMESEC 2011»
14 years 4 months ago
Collaborative Location Privacy with Rational Users
Recent smartphones incorporate embedded GPS devices that enable users to obtain geographic information about their surroundings by providing a location-based service (LBS) with the...
Francisco Santos, Mathias Humbert, Reza Shokri, Je...
CCS
2008
ACM
15 years 6 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung