Sciweavers

928 search results - page 65 / 186
» Safety management of complex technology
Sort
View
IJCSA
2008
237views more  IJCSA 2008»
13 years 9 months ago
Development of A SOLAP Patrimony Management Application System: Fez Medina as a Case Study
It is well known that transactional and analytical systems each require different database architecture. In general, the database structure of transactional systems is optimized f...
I. Salam, M. El Mohajir, A. Taleb, B. El Mohajir
SUM
2009
Springer
14 years 4 months ago
Query Answering in Belief Logic Programming
Abstract. In this paper we introduce a fixpoint semantics for quantitative logic programming, which is able to both combine and correlate evidence from different sources of infor...
Hui Wan, Michael Kifer
DELTA
2002
IEEE
14 years 2 months ago
Multi-User Detection for CDMA Communications Based on Self Organized Neural Networks Structures
In the upcoming high transmission rate system, based on code division multiple access, standard multi-user detection methods are restricted because of performance and implementati...
Florent Carlier, Fabienne Nouvel, Jacques Citerne
ISW
1997
Springer
14 years 1 months ago
Secure Applications of Low-Entropy Keys
We introduce the notion of key stretching, a mechanism to convert short s-bit keys into longer keys, such that the complexity required to brute-force search a s + t-bit keyspace is...
John Kelsey, Bruce Schneier, Chris Hall, David Wag...
OOIS
1997
Springer
14 years 1 months ago
A Framework for Component-Oriented Tool Integration
Tool environments supporting the development of complex products need to be open and flexible. These requirements cannot be fulfilled in an adequate way by predefined coordinat...
Kai-Uwe Sattler