Sciweavers

1995 search results - page 358 / 399
» Belief in Information Flow
Sort
View
USENIX
2007
13 years 10 months ago
Using Provenance to Aid in Personal File Search
As the scope of personal data grows, it becomes increasingly difficult to find what we need when we need it. Desktop search tools provide a potential answer, but most existing too...
Sam Shah, Craig A. N. Soules, Gregory R. Ganger, B...
WSC
2007
13 years 10 months ago
A test implementation of the core manufacturing simulation data specification
This paper describes an effort of testing the Core Manufacturing Simulation Data (CMSD) information model as a neutral data interface for a discrete event simulation model develop...
Marcus Johansson, Björn Johansson, Anders Sko...
WSC
2007
13 years 10 months ago
Measuring manufacturing throughput using takt time analysis and simulation
This paper is motivated by a case study performed at a company that manufactures two main types of customized products. In an effort to significantly increase their throughput cap...
Jun Duanmu, Kevin Taaffe
WSC
2008
13 years 10 months ago
Creating and using non-kinetic effects: Training joint forces for asymmetric operations
US military forces now face asymmetric military operations. Management of relationships with civilians is often crucial to success. Local population groups can provide critical in...
Hugh Henry, Robert G. Chamberlain
APLAS
2008
ACM
13 years 9 months ago
Context-Sensitive Relevancy Analysis for Efficient Symbolic Execution
Abstract. Symbolic execution is a flexible and powerful, but computationally expensive technique to detect dynamic behaviors of a program. In this paper, we present a context-sensi...
Xin Li, Daryl Shannon, Indradeep Ghosh, Mizuhito O...