Sciweavers

1159 search results - page 171 / 232
» Binary Decision Graphs
Sort
View
DISOPT
2008
81views more  DISOPT 2008»
15 years 3 months ago
Intermediate integer programming representations using value disjunctions
We introduce a general technique to create an extended formulation of a mixed-integer program. We classify the integer variables into blocks, each of which generates a finite set ...
Matthias Köppe, Quentin Louveaux, Robert Weis...
EOR
2008
86views more  EOR 2008»
15 years 3 months ago
Fuzzy inference to assess manufacturing process capability with imprecise data
Process capability indices provide numerical measures on whether a process conforms to the defined manufacturing capability prerequisite. These have been successfully applied by c...
Bi-Min Hsu, Ming-Hung Shu
CN
2006
191views more  CN 2006»
15 years 3 months ago
Detection and diagnosis of data inconsistency failures in wireless sensor networks
Most fault-tolerant schemes for wireless sensor networks focus on power failures or crash faults. Little attention has been paid to the data inconsistency failures which occur whe...
Kuo-Feng Ssu, Chih-Hsun Chou, Hewijin Christine Ji...
IJRR
2008
101views more  IJRR 2008»
15 years 3 months ago
Motion Planning Under Uncertainty for Image-guided Medical Needle Steering
We develop a new motion planning algorithm for a variant of a Dubins car with binary left/right steering and apply it to steerable needles, a new class of flexible beveltip medica...
Ron Alterovitz, Michael S. Branicky, Kenneth Y. Go...
ISI
2006
Springer
15 years 3 months ago
Cost-Sensitive Access Control for Illegitimate Confidential Access by Insiders
Abstract. In many organizations, it is common to control access to confidential information based on the need-to-know principle; The requests for access are authorized only if the ...
Young-Woo Seo, Katia P. Sycara