Sciweavers

5665 search results - page 58 / 1133
» Introduction to Computer Security
Sort
View
101
Voted
AINA
2008
IEEE
15 years 8 months ago
Fortification of IT Security by Automatic Security Advisory Processing
Stefan Fenz, Andreas Ekelhart, Edgar R. Weippl
210
Voted

Lecture Notes
2225views
17 years 14 days ago
Microeconomics
The main objective of the course is for students to be able to analyze problems in microeconomic theory at the beginning graduate level. Students successfully completing the course...
Arne Hallam
95
Voted
DAC
2001
ACM
16 years 3 months ago
MetaCores: Design and Optimization Techniques
Currently, hardware intellectual property (IP) is delivered at vels of abstraction: hard, firm, and soft. In order to further enhance performance, efficiency, and flexibility of I...
Seapahn Meguerdichian, Farinaz Koushanfar, Advait ...
HM
2005
Springer
140views Optimization» more  HM 2005»
15 years 7 months ago
Fast Ejection Chain Algorithms for Vehicle Routing with Time Windows
Abstract. This paper introduces a new algorithm, based on the concept of ejection chains, to effectively target vehicle routing problems with time window constraints (VRPTW). Ejec...
Herman Sontrop, Pieter van der Horn, Marc Uetz
MIDDLEWARE
2005
Springer
15 years 7 months ago
Sensor bean: a component platform for sensor-based services
Sensor-based services propose to gather, manage, analyze, access and react to sensor data. These services are distributed over heterogeneous platforms. The complexity of the imple...
Cristina Marin, Mikael Desertot