Sciweavers

12289 search results - page 387 / 2458
» computing 2006
Sort
View
125
Voted
COR
2006
94views more  COR 2006»
15 years 5 months ago
Computing obnoxious 1-corner polygonal chains
We consider an obnoxious facility location problem in which the facility is a trajectory consisting of a bounded length polygonal chain of two edges having extremes anchored at tw...
José Miguel Díaz-Báñez...
137
Voted
CTW
2006
107views more  CTW 2006»
15 years 5 months ago
Human computer interaction methods for electronic flight bag envisionment and design
This paper reports on the application of a range of human computer interaction (HCI) methods to the redesign of an electronic flight bag (EFB), as part of a commercial software dev...
Joan Cahill, Nick McDonald
ICGA
2006
97views Optimization» more  ICGA 2006»
15 years 5 months ago
Computer Analysis of World Chess Champions
Who is the best chess player of all time? Chess players are often interested in this question that has never been answered authoritatively, because it requires comparison between c...
Matej Guid, Ivan Bratko
ICDE
2006
IEEE
138views Database» more  ICDE 2006»
16 years 6 months ago
SUBSKY: Efficient Computation of Skylines in Subspaces
Given a set of multi-dimensional points, the skyline contains the best points according to any preference function that is monotone on all axes. In practice, applications that req...
Yufei Tao, Xiaokui Xiao, Jian Pei
ACSAC
2006
IEEE
15 years 11 months ago
Engineering Sufficiently Secure Computing
We propose an architecture of four complimentary technologies increasingly relevant to a growing number of home users and organizations: cryptography, separation kernels, formal v...
Brian Witten