Sciweavers

88 search results - page 15 / 18
» Towards a Methodology for Designing E-Government Control Pro...
Sort
View
CCE
2008
13 years 7 months ago
Chance constrained programming approach to process optimization under uncertainty
Deterministic optimization approaches have been well developed and widely used in the process industry to accomplish off-line and on-line process optimization. The challenging tas...
Pu Li, Harvey Arellano-Garcia, Günter Wozny
CCS
2010
ACM
13 years 4 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
MOBISYS
2010
ACM
13 years 9 months ago
Anatomizing application performance differences on smartphones
The use of cellular data networks is increasingly popular due to the widespread deployment of 3G technologies and the rapid adoption of smartphones, such as iPhone and GPhone. Bes...
Junxian Huang, Qiang Xu, Birjodh Tiwana, Zhuoqing ...
ISBI
2006
IEEE
14 years 8 months ago
Automated super-resolution detection of fluorescent rods in 2D
We describe a method designed to detect fluorescent rods from 2D microscopy images. It is motivated by the desire to study the dynamics of bacteria such as Shigella. The methodolo...
Bo Zhang, Jost Enninga, Jean-Christophe Olivo-Mari...
WCE
2007
13 years 8 months ago
Human error of commission modeled with Theory of Games
— Industrial plants makes a carefully trace of the human intervention on the process. This intervention happens at different points in the history of the facility, since the desi...
Selva S. Rivera, Jorge E. Núñez Mc L...