Sciweavers

2027 search results - page 201 / 406
» When is it best to best-respond
Sort
View
WCNC
2008
IEEE
15 years 7 months ago
Novel Ultra Wideband Low Complexity Ranging Using Different Channel Statistics
—UWB technology can reach centimetre level ranging and positioning accuracy in LOS propagation when time of arrival techniques are used. However, in a real positioning system, th...
Giovanni Bellusci, Gerard J. M. Janssen, Junlin Ya...
ACISP
2008
Springer
15 years 7 months ago
Advanced Permission-Role Relationship in Role-Based Access Control
Abstract. Permission-role assignment is an important issue in rolebased access control (RBAC). There are two types of problems that may arise in permission-role assignment. One is ...
Min Li, Hua Wang, Ashley W. Plank, Jianming Yong
BDIM
2007
IEEE
99views Business» more  BDIM 2007»
15 years 7 months ago
Model-Based Mitigation of Availability Risks
The assessment and mitigation of risks related to the availability of the IT infrastructure is becoming increasingly important in modern organizations. Unfortunately, present stan...
Emmanuele Zambon, Damiano Bolzoni, Sandro Etalle, ...
CEC
2007
IEEE
15 years 7 months ago
Improving hypervolume-based multiobjective evolutionary algorithms by using objective reduction methods
— Hypervolume based multiobjective evolutionary algorithms (MOEA) nowadays seem to be the first choice when handling multiobjective optimization problems with many, i.e., at lea...
Dimo Brockhoff, Eckart Zitzler
CIDM
2007
IEEE
15 years 7 months ago
Reactive Query Policies: A Formalism for Planning with Volatile External Information
— To generate plans for collecting data for data mining, an important problem is information volatility during planning: the information needed by the planning system may change ...
Tsz-Chiu Au, Dana S. Nau