Sciweavers

2702 search results - page 464 / 541
» constraints 2008
Sort
View
ATAL
2008
Springer
14 years 11 months ago
A multi-agent simulation system for prediction and scheduling of aero engine overhaul
The Aero Repair and Overhaul industry is facing an increasing challenge of prediction and scheduling of engine overhauls to remain competitive in a complex business arena. An appr...
Armin Stranjak, Partha Sarathi Dutta, Mark Ebden, ...
ATVA
2008
Springer
143views Hardware» more  ATVA 2008»
14 years 11 months ago
Automating Algebraic Specifications of Non-freely Generated Data Types
Abstract. Non-freely generated data types are widely used in case studies carried out in the theorem prover KIV. The most common examples are stores, sets and arrays. We present an...
Andriy Dunets, Gerhard Schellhorn, Wolfgang Reif
AUSDM
2008
Springer
188views Data Mining» more  AUSDM 2008»
14 years 11 months ago
Priority Driven K-Anonymisation for Privacy Protection
Given the threat of re-identification in our growing digital society, guaranteeing privacy while providing worthwhile data for knowledge discovery has become a difficult problem. ...
Xiaoxun Sun, Hua Wang, Jiuyong Li
CANS
2008
Springer
103views Cryptology» more  CANS 2008»
14 years 11 months ago
A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks
Abstract. Wireless sensors are low power devices which are highly constrained in terms of computational capabilities, memory, and communication bandwidth. While battery life is the...
David Galindo, Rodrigo Roman, Javier Lopez
CAV
2008
Springer
158views Hardware» more  CAV 2008»
14 years 11 months ago
Linear Arithmetic with Stars
We consider an extension of integer linear arithmetic with a "star" operator takes closure under vector addition of the solution set of a linear arithmetic subformula. We...
Ruzica Piskac, Viktor Kuncak