Sciweavers

1159 search results - page 171 / 232
» Binary Decision Graphs
Sort
View
DISOPT
2008
81views more  DISOPT 2008»
13 years 10 months ago
Intermediate integer programming representations using value disjunctions
We introduce a general technique to create an extended formulation of a mixed-integer program. We classify the integer variables into blocks, each of which generates a finite set ...
Matthias Köppe, Quentin Louveaux, Robert Weis...
EOR
2008
86views more  EOR 2008»
13 years 10 months ago
Fuzzy inference to assess manufacturing process capability with imprecise data
Process capability indices provide numerical measures on whether a process conforms to the defined manufacturing capability prerequisite. These have been successfully applied by c...
Bi-Min Hsu, Ming-Hung Shu
CN
2006
191views more  CN 2006»
13 years 10 months ago
Detection and diagnosis of data inconsistency failures in wireless sensor networks
Most fault-tolerant schemes for wireless sensor networks focus on power failures or crash faults. Little attention has been paid to the data inconsistency failures which occur whe...
Kuo-Feng Ssu, Chih-Hsun Chou, Hewijin Christine Ji...
IJRR
2008
101views more  IJRR 2008»
13 years 10 months ago
Motion Planning Under Uncertainty for Image-guided Medical Needle Steering
We develop a new motion planning algorithm for a variant of a Dubins car with binary left/right steering and apply it to steerable needles, a new class of flexible beveltip medica...
Ron Alterovitz, Michael S. Branicky, Kenneth Y. Go...
ISI
2006
Springer
13 years 10 months ago
Cost-Sensitive Access Control for Illegitimate Confidential Access by Insiders
Abstract. In many organizations, it is common to control access to confidential information based on the need-to-know principle; The requests for access are authorized only if the ...
Young-Woo Seo, Katia P. Sycara