Sciweavers

753 search results - page 40 / 151
» Fragments-based Model Reduction: Some Case Studies
Sort
View
ICDE
2009
IEEE
690views Database» more  ICDE 2009»
14 years 3 months ago
A Model for Data Leakage Detection
— We study the following problem: A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data is leaked and found in an un...
Panagiotis Papadimitriou 0002, Hector Garcia-Molin...
ICCSA
2007
Springer
13 years 10 months ago
Supplier Selection for a Newsboy Model with Budget and Service Level Constraints
A style dress outlet usually purchases products from multiple suppliers with different cost, quality and selling price. It is assumed that some suppliers will sell their goods to t...
P. C. Yang, H. M. Wee, Erwie Zahara, S. H. Kang, Y...
ICDS
2009
IEEE
14 years 3 months ago
An Iterative Method to Design Traffic Flow Models
Existing traffic flow modeling theory lacks of guidelines to construct traffic flow models from scratch. In addition, traffic flow models are mainly analyzed with computer simulat...
Juan Manuel González-Calleros, Jorge Mart&i...
WSC
2008
13 years 11 months ago
Towards a flexible business process modeling and simulation environment
Business process is crucial to the success of any business. Business process modeling enables a common understanding and analysis of a business process, and simulation is an effec...
Changrui Ren, Wei Wang, Jin Dong, Hongwei Ding, Bi...
SARA
2009
Springer
14 years 3 months ago
Common Subexpressions in Constraint Models of Planning Problems
Constraint Programming is an attractive approach for solving AI planning problems by modelling them as Constraint Satisfaction Problems (CSPs). However, formulating effective cons...
Andrea Rendl, Ian Miguel, Ian P. Gent, Peter Grego...