Sciweavers

9581 search results - page 1873 / 1917
» On Ubiquitous Integrated Computing
Sort
View
SNPD
2008
13 years 10 months ago
Effect of Security Increment to Symmetric Data Encryption through AES Methodology
The selective application of technological and related procedural safeguards is an important responsibility of every organization in providing adequate security to its electronic ...
Md. Nazrul Islam, Md. Monir Hossain Mia, Muhammad ...
SODA
2008
ACM
185views Algorithms» more  SODA 2008»
13 years 10 months ago
Better bounds for online load balancing on unrelated machines
We study the problem of scheduling permanent jobs on unrelated machines when the objective is to minimize the Lp norm of the machine loads. The problem is known as load balancing ...
Ioannis Caragiannis
SPRINGSIM
2008
13 years 10 months ago
Implementation by simulation; strategies for ultrasound screening for hip dysplasia in the Netherlands
Background: Implementation of medical interventions may vary with organization and available capacity. The influence of this source of variability on the cost-effectiveness can be...
Sabrina Ramwadhdoebe, Godefridus G. van Merode, Ma...
DLOG
2003
13 years 10 months ago
Implementing Matching in ALE--First Results
Matching problems in Description Logics are theoretically well understood, with a variety of algorithms available for different DLs. Nevertheless, still no implementation of a ge...
Sebastian Brandt
IJCAI
2003
13 years 10 months ago
Writer's Aid: Using a Planner in a Collaborative Interface
Writer’s Aid is a collaborative system that works simultaneously with an author editing a document providing assistance in identifying and inserting citation keys and autonomous...
Tamara Babaian, Barbara J. Grosz, Stuart M. Shiebe...
« Prev « First page 1873 / 1917 Last » Next »