Sciweavers

1221 search results - page 230 / 245
» A Comparison of Two Programming Models for Pervasive Computi...
Sort
View
COR
2006
113views more  COR 2006»
13 years 8 months ago
Capacitated facility location problem with general setup cost
This paper presents an extension of the capacitated facility location problem (CFLP), in which the general setup cost functions and multiple facilities in one site are considered....
Ling-Yun Wu, Xiang-Sun Zhang, Ju-Liang Zhang
INFORMATICALT
2007
71views more  INFORMATICALT 2007»
13 years 8 months ago
Multiple Shift Scheduling of Hierarchical Workforce with Multiple Work Centers
This paper is concerned with an employee scheduling problem involving multiple shifts and work centers, where employees belong to a hierarchy of categories having downward substitu...
Salem M. Al-Yakoob, Hanif D. Sherali
TDSC
2008
152views more  TDSC 2008»
13 years 8 months ago
Towards Formal Verification of Role-Based Access Control Policies
Specifying and managing access control policies is a challenging problem. We propose to develop formal verification techniques for access control policies to improve the current s...
Somesh Jha, Ninghui Li, Mahesh V. Tripunitara, Qih...
CLASSIFICATION
2004
59views more  CLASSIFICATION 2004»
13 years 8 months ago
Oscillation Heuristics for the Two-group Classification Problem
: We propose a new nonparametric family of oscillation heuristics for improving linear classifiers in the two-group discriminant problem. The heuristics are motivated by the intuit...
Ognian Asparouhov, Paul A. Rubin
IDEAL
2010
Springer
13 years 6 months ago
Trajectory Based Behavior Analysis for User Verification
Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a gen...
Hsing-Kuo Pao, Hong-Yi Lin, Kuan-Ta Chen, Junaidil...