Sciweavers

1940 search results - page 346 / 388
» Optimizing search engines using clickthrough data
Sort
View
CSFW
1999
IEEE
14 years 1 months ago
A Meta-Notation for Protocol Analysis
Most formal approaches to security protocol analysis are based on a set of assumptions commonly referred to as the "Dolev-Yao model." In this paper, we use a multiset re...
Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln...
EOR
2008
87views more  EOR 2008»
13 years 9 months ago
Robust surgery loading
We consider the robust surgery loading problem for a hospital's operating theatre department, which concerns assigning surgeries and sufficient planned slack to operating roo...
Erwin W. Hans, Gerhard Wullink, Mark van Houdenhov...
GECCO
2004
Springer
119views Optimization» more  GECCO 2004»
14 years 2 months ago
Learning Environment for Life Time Value Calculation of Customers in Insurance Domain
A critical success factor in Insurance business is its ability to use information sources and contained knowledge in the most effective way. Its profitability is obtained through t...
Andrea Tettamanzi, Luca Sammartino, Mikhail Simono...
CF
2008
ACM
13 years 11 months ago
DMA-based prefetching for i/o-intensive workloads on the cell architecture
Recent advent of the asymmetric multi-core processors such as Cell Broadband Engine (Cell/BE) has popularized the use of heterogeneous architectures. A growing body of research is...
M. Mustafa Rafique, Ali Raza Butt, Dimitrios S. Ni...
FPGA
2004
ACM
234views FPGA» more  FPGA 2004»
14 years 18 days ago
An embedded true random number generator for FPGAs
Field Programmable Gate Arrays (FPGAs) are an increasingly popular choice of platform for the implementation of cryptographic systems. Until recently, designers using FPGAs had le...
Paul Kohlbrenner, Kris Gaj