Sciweavers

286 search results - page 43 / 58
» Fuzzy Sets and Rough Sets for Scenario Modelling and Analysi...
Sort
View
SCAM
2003
IEEE
14 years 27 days ago
Managing Multi-Billion Dollar IT Budgets using Source Code Analysis
We present a quantitative approach for IT portfolio management. This is an approach that CMM level 1 organizations can use to obtain a corporate wide impression of the state of th...
Chris Verhoef
IAT
2003
IEEE
14 years 28 days ago
Problem-solving in open environments
With the increasing use of the internet, many problemsolving tasks such as resource allocation, scheduling, planning, and configuration pose themselves in an open setting involvi...
Santiago Macho-Gonzalez, Boi Faltings
WSC
1998
13 years 9 months ago
Using Simulation to Optimize a Horizontal Carousel Storage System
Carousel storage systems are often used to increase storage density, throughput and efficiency while reducing inventory and man-hours. The Hewlett-Packard company has developed a ...
Todd LeBaron, Michael L. Hoffman
DAC
2000
ACM
14 years 8 months ago
Forensic engineering techniques for VLSI CAD tools
The proliferation of the Internet has a ected the business model of almost all semiconductor and VLSI CAD companies that rely on intellectual property (IP) as their main source of...
Darko Kirovski, David T. Liu, Jennifer L. Wong, Mi...
INFOCOM
2007
IEEE
14 years 1 months ago
Finding Self-Similarities in Opportunistic People Networks
— Opportunistic network is a type of Delay Tolerant Networks (DTN) where network communication opportunities appear opportunistic. In this study, we investigate opportunistic net...
Ling-Jyh Chen, Yung-Chih Chen, Tony Sun, Paruvelli...