Sciweavers

2736 search results - page 529 / 548
» Implementable allocation rules
Sort
View
JELIA
2004
Springer
14 years 3 months ago
tascpl: TAS Solver for Classical Propositional Logic
We briefly overview the most recent improvements we have incorporated to the existent implementations of the TAS methodology, the simplified ∆-tree representation of formulas i...
Manuel Ojeda-Aciego, Agustín Valverde
SAB
2004
Springer
289views Optimization» more  SAB 2004»
14 years 3 months ago
An Overview of Physicomimetics
This paper provides an overview of our framework, called physicomimetics, for the distributed control of swarms of robots. We focus on robotic behaviors that are similar to those s...
William M. Spears, Diana F. Spears, Rodney Heil, W...
WWW
2010
ACM
14 years 3 months ago
Reining in the web with content security policy
The last three years have seen a dramatic increase in both awareness and exploitation of Web Application Vulnerabilities. 2008 and 2009 saw dozens of high-profile attacks against...
Sid Stamm, Brandon Sterne, Gervase Markham
HICSS
2003
IEEE
137views Biometrics» more  HICSS 2003»
14 years 3 months ago
Adjusting Safety Stock Requirements with an AHP-Based Risk Analysis
In most cases safety stock is determined based on the variability of the demand and lead time. The focus has been on the statistics and past performance, and the existing framewor...
Jukka Korpela, Antti Lehmusvaara, Kalevi Kylä...
HICSS
2003
IEEE
125views Biometrics» more  HICSS 2003»
14 years 3 months ago
Applying a Layered Policy Model to IP Based Voice Services
Traditionally, specific telecommunications services were essentially confined to certain types of networks; e.g., television over broadcast networks or cable and voice service ove...
Douglas C. Sicker