Sciweavers

8828 search results - page 1538 / 1766
» Formal methods in practice
Sort
View
DMSN
2010
ACM
15 years 4 months ago
Provenance-based trustworthiness assessment in sensor networks
As sensor networks are being increasingly deployed in decisionmaking infrastructures such as battlefield monitoring systems and SCADA(Supervisory Control and Data Acquisition) sys...
Hyo-Sang Lim, Yang-Sae Moon, Elisa Bertino
HM
2010
Springer
146views Optimization» more  HM 2010»
15 years 4 months ago
An Improved Memetic Algorithm for Break Scheduling
In this paper we consider solving a complex real life break scheduling problem. This problem of high practical relevance arises in many working areas, e.g. in air traffic control a...
Magdalena Widl, Nysret Musliu
CEC
2010
IEEE
15 years 5 months ago
Classifier-assisted constrained evolutionary optimization for automated geometry selection of orthodontic retraction spring
In orthodontics, retraction springs made of metallic wires are often used to move a tooth with respect to another by the virtue of the spring back effect. Specially selected form o...
Dudy Lim, Yew-Soon Ong, Rachman Setiawan, Muhammad...
AMC
2010
155views more  AMC 2010»
15 years 4 months ago
Temporally regularized direct numerical simulation
Experience with fluid-flow simulation suggests that, in some instances, under-resolved direct numerical simulation (DNS), without a residual-stress model per se but with artificial...
William J. Layton, C. David Pruett, Leo G. Rebholz
ARC
2010
Springer
154views Hardware» more  ARC 2010»
15 years 4 months ago
Perspectives on system identification
: System identification is the art and science of building mathematical models of dynamic systems from observed input-output data. It can be seen as the interface between the real ...
Lennart Ljung
« Prev « First page 1538 / 1766 Last » Next »