Sciweavers

286 search results - page 53 / 58
» Playing the Minesweeper with Constraints
Sort
View
DESRIST
2009
Springer
125views Education» more  DESRIST 2009»
14 years 3 days ago
An empirical evaluation of information security awareness levels in designing secure business processes
Information Systems Security (ISS) is critical to ensuring the integrity and credibility of digitally exchanged information in business processes. Information systems development ...
Fergle D'Aubeterre, Lakshmi S. Iyer, Rahul Singh
CCO
2001
Springer
168views Combinatorics» more  CCO 2001»
13 years 12 months ago
Mathematical Programming Models and Formulations for Deterministic Production Planning Problems
Abstract. We study in this lecture the literature on mixed integer programming models and formulations for a specific problem class, namely deterministic production planning probl...
Yves Pochet
VLDB
2001
ACM
109views Database» more  VLDB 2001»
13 years 12 months ago
Analyzing energy behavior of spatial access methods for memory-resident data
The proliferation of mobile and pervasive computing devices has brought energy constraints into the limelight, together with performance considerations. Energy-conscious design is...
Ning An, Anand Sivasubramaniam, Narayanan Vijaykri...
DEXAW
1999
IEEE
322views Database» more  DEXAW 1999»
13 years 11 months ago
The Process of Inconsistency Management: A Framework for Understanding
The process of managing inconsistency is a fundamental activity that permeates a large part of the systems development process. Failure to identify inconsistencies may lead to maj...
Bashar Nuseibeh, Steve M. Easterbrook
MOBIDE
1999
ACM
13 years 11 months ago
Pervasive Computing: What is it Good for?
The first mass-produced pervasive computing devices are starting to appear—the AutoPC, the Internet-connected ScreenFridge, and the combination Microwave Oven/Home Banking term...
Andrew C. Huang, Benjamin C. Ling, Shankar Ponneka...