Sciweavers

12438 search results - page 98 / 2488
» The Magic of a Number System
Sort
View
127
Voted
SP
1996
IEEE
121views Security Privacy» more  SP 1996»
15 years 7 months ago
A Security Policy Model for Clinical Information Systems
The protection of personal health information has become a live issue in a number of countries including the USA, Canada, Britain and Germany. The debate has shown that there is w...
Ross J. Anderson
142
Voted
GLOBECOM
2007
IEEE
15 years 7 months ago
CAC for Multibeam Opportunistic Schemes in Heterogeneous WiMax Systems Under QoS Constraints
Spatial scheduling in a heterogeneous WiMax Downlink channel, based on partial Channel State Information at the Transmitter (CSIT), is carried out through a multibeam opportunistic...
Nizar Zorba, Ana I. Pérez-Neira
115
Voted
MOR
2006
90views more  MOR 2006»
15 years 3 months ago
Optimal Control of a High-Volume Assemble-to-Order System
This paper provides guidance for operating an assemble-to-order system to maximize expected discounted profit, assuming that a high volume of prospective customers arrive per unit...
Erica L. Plambeck, Amy R. Ward
178
Voted
TFS
2008
157views more  TFS 2008»
15 years 3 months ago
Efficient Self-Evolving Evolutionary Learning for Neurofuzzy Inference Systems
Abstract--This study proposes an efficient self-evolving evolutionary learning algorithm (SEELA) for neurofuzzy inference systems (NFISs). The major feature of the proposed SEELA i...
Cheng-Jian Lin, Cheng-Hung Chen, Chin-Teng Lin
159
Voted
JOT
2010
153views more  JOT 2010»
15 years 2 months ago
Identification of System Software Components Using Clustering Approach
The selection of software architecture style is an important decision of design stage, and has a significant impact on various system quality attributes. To determine software arc...
Gholamreza Shahmohammadi, Saeed Jalili, Seyed Moha...