Sciweavers

3270 search results - page 533 / 654
» Approximate String Processing
Sort
View
ISI
2004
Springer
14 years 3 months ago
Aligning Simulation Models of Smallpox Outbreaks
We aligned two fundamentally different models of smallpox transmission after a bioterrorist attack: A location-explicit multi-agent model (BioWar) and the conventional epidemiologi...
Li-Chiou Chen, Boris Kaminsky, Tiffany Tummino, Ka...
PPSN
2004
Springer
14 years 3 months ago
Evolution of Voronoi-Based Fuzzy Controllers
A fuzzy controller is usually designed by formulating the knowledge of a human expert into a set of linguistic variables and fuzzy rules. One of the most successful methods to auto...
Carlos Kavka, Marc Schoenauer
3DIM
2003
IEEE
14 years 3 months ago
Digital Preservation of Ancient Cuneiform Tablets Using 3D-Scanning
Cuneiform is the world’s oldest known writing system. Ancient scribes impressed reed styluses onto damp clay to write the approximately 900 different logographic, syllabic and t...
Subodh Kumar, Dean Snyder, Donald Duncan, Jonathan...
ACSC
2003
IEEE
14 years 3 months ago
A Practical Method to Counteract Denial of Service Attacks
Today distributed denial of service (DDoS) attacks are causing major problems to conduct online business over the Internet. Recently several schemes have been proposed on how to p...
Udaya Kiran Tupakula, Vijay Varadharajan
AGILEDC
2003
IEEE
14 years 3 months ago
Iteration Advocate/Iteration Transition Meeting: Small Sampling of New agile Techniques Used at a Major Telecommunications Firm
This paper documents a successful implementation of agile at a major telecommunications firm. Critical aspects to mention about this particular software endeavor include a) this c...
Brian S. Boelsterli