Sciweavers

5456 search results - page 1047 / 1092
» A study of Object Evolution
Sort
View
115
Voted
CP
2004
Springer
15 years 8 months ago
A Hybrid Method for Planning and Scheduling
We combine mixed integer linear programming (MILP) and constraint programming (CP) to solve planning and scheduling problems. Tasks are allocated to facilities using MILP and sche...
John N. Hooker
123
Voted
ESA
2004
Springer
145views Algorithms» more  ESA 2004»
15 years 8 months ago
Flows on Few Paths: Algorithms and Lower Bounds
Abstract. Classical network flow theory allows decomposition of flow into several chunks of arbitrary sizes traveling through the network on different paths. In the first part ...
Maren Martens, Martin Skutella
DSN
2003
IEEE
15 years 8 months ago
A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities
This paper combines an analysis of data on security vulnerabilities (published in Bugtraq database) and a focused source-code examination to develop a finite state machine (FSM) m...
Shuo Chen, Zbigniew Kalbarczyk, Jun Xu, Ravishanka...
120
Voted
ICRA
2003
IEEE
126views Robotics» more  ICRA 2003»
15 years 7 months ago
Experimental analysis of an innovative prosthetic hand with proprioceptive sensors
— This paper presents an underactuated artificial hand intended for functional replacement of the natural hand in upper limb amputees. The natural hand has three basic functiona...
Maria Chiara Carrozza, Fabrizio Vecchi, F. Sebasti...
WCRE
2003
IEEE
15 years 7 months ago
GUI Ripping: Reverse Engineering of Graphical User Interfaces for Testing
Graphical user interfaces (GUIs) are important parts of today’s software and their correct execution is required to ensure the correctness of the overall software. A popular tec...
Atif M. Memon, Ishan Banerjee, Adithya Nagarajan
« Prev « First page 1047 / 1092 Last » Next »