Sciweavers

12438 search results - page 98 / 2488
» The Magic of a Number System
Sort
View
SP
1996
IEEE
121views Security Privacy» more  SP 1996»
14 years 10 days ago
A Security Policy Model for Clinical Information Systems
The protection of personal health information has become a live issue in a number of countries including the USA, Canada, Britain and Germany. The debate has shown that there is w...
Ross J. Anderson
GLOBECOM
2007
IEEE
14 years 1 days ago
CAC for Multibeam Opportunistic Schemes in Heterogeneous WiMax Systems Under QoS Constraints
Spatial scheduling in a heterogeneous WiMax Downlink channel, based on partial Channel State Information at the Transmitter (CSIT), is carried out through a multibeam opportunistic...
Nizar Zorba, Ana I. Pérez-Neira
MOR
2006
90views more  MOR 2006»
13 years 8 months ago
Optimal Control of a High-Volume Assemble-to-Order System
This paper provides guidance for operating an assemble-to-order system to maximize expected discounted profit, assuming that a high volume of prospective customers arrive per unit...
Erica L. Plambeck, Amy R. Ward
TFS
2008
157views more  TFS 2008»
13 years 7 months ago
Efficient Self-Evolving Evolutionary Learning for Neurofuzzy Inference Systems
Abstract--This study proposes an efficient self-evolving evolutionary learning algorithm (SEELA) for neurofuzzy inference systems (NFISs). The major feature of the proposed SEELA i...
Cheng-Jian Lin, Cheng-Hung Chen, Chin-Teng Lin
JOT
2010
153views more  JOT 2010»
13 years 6 months ago
Identification of System Software Components Using Clustering Approach
The selection of software architecture style is an important decision of design stage, and has a significant impact on various system quality attributes. To determine software arc...
Gholamreza Shahmohammadi, Saeed Jalili, Seyed Moha...