Sciweavers

7315 search results - page 1321 / 1463
» Peer-to-Peer Information Search
Sort
View
DKE
2008
106views more  DKE 2008»
13 years 8 months ago
Towards optimal k-anonymization
When releasing microdata for research purposes, one needs to preserve the privacy of respondents while maximizing data utility. An approach that has been studied extensively in re...
Tiancheng Li, Ninghui Li
EOR
2008
87views more  EOR 2008»
13 years 8 months ago
Robust surgery loading
We consider the robust surgery loading problem for a hospital's operating theatre department, which concerns assigning surgeries and sufficient planned slack to operating roo...
Erwin W. Hans, Gerhard Wullink, Mark van Houdenhov...
ESWA
2008
195views more  ESWA 2008»
13 years 8 months ago
Automatic expert identification using a text categorization technique in knowledge management systems
Since tacit knowledge such as know-how and experiences is hard to be managed effectively using information technology, it is recently proposed that providing an appropriate expert...
Kun-Woo Yang, Soon-Young Huh
AUTOMATICA
2006
112views more  AUTOMATICA 2006»
13 years 8 months ago
Joint identification of plant rational models and noise distribution functions using binary-valued observations
System identification of plants with binary-valued output observations is of importance in understanding modeling capability and limitations for systems with limited sensor inform...
Le Yi Wang, Gang George Yin, Ji-Feng Zhang
CONSTRAINTS
2006
115views more  CONSTRAINTS 2006»
13 years 8 months ago
A Cost-Regular Based Hybrid Column Generation Approach
Abstract. Constraint Programming (CP) offers a rich modeling language of constraints embedding efficient algorithms to handle complex and heterogeneous combinatorial problems. To s...
Sophie Demassey, Gilles Pesant, Louis-Martin Rouss...
« Prev « First page 1321 / 1463 Last » Next »