Sciweavers

1926 search results - page 278 / 386
» Modeling and Model Checking Software Product Lines
Sort
View
HICSS
2003
IEEE
138views Biometrics» more  HICSS 2003»
15 years 9 months ago
A Single Buyer-Single Supplier Bargaining Problem with Asymmetric Information - Theoretical Approach and Software Implementation
This paper is focused on the coordination of order and production policy between buyers and suppliers in supply chains. When a buyer and a supplier of an item work independently, ...
Eric Sucky

Book
363views
17 years 2 months ago
Computational Linguistics: Models, Resources, Applications
"Can computers meaningfully process human language? If this is difficult, why? If this is possible, how? This book introduces the reader to the fascinating science of computat...
Igor A. Bolshakov and Alexander Gelbukh
ISCAS
2007
IEEE
141views Hardware» more  ISCAS 2007»
15 years 10 months ago
Analog Emulation of a Reconfigurable Tap Changing Transformer
—Accurate analog models of power system components are required in order to realize an analog computation engine for power systems. Analog computation is an area of continued int...
Aaron St. Leger, Juan C. Jimenez, Agung Fu, Sanal ...
AIL
2004
113views more  AIL 2004»
15 years 4 months ago
On the Ontological Status of Plans and Norms
This article describes an ontological model of norms. The basic assumption is that a substantial part of a legal system is grounded on the concept of agency. Since a legal system a...
Guido Boella, Leonardo Lesmo, Rossana Damiano
135
Voted
CIKM
2005
Springer
15 years 9 months ago
A function-based access control model for XML databases
XML documents are frequently used in applications such as business transactions and medical records involving sensitive information. Typically, parts of documents should be visibl...
Naizhen Qi, Michiharu Kudo, Jussi Myllymaki, Hamid...