Sciweavers

672 search results - page 97 / 135
» Words and forbidden factors
Sort
View
JTAER
2008
103views more  JTAER 2008»
13 years 8 months ago
Reducing False Reads in RFID-Embedded Supply Chains
RFID tags are increasingly being used in supply chain applications due to their potential in engendering supply chain visibility and reducing tracking errors through instantaneous...
Yu-Ju Tu, Selwyn Piramuthu
JUCS
2008
124views more  JUCS 2008»
13 years 8 months ago
Query Transformation Based on Semantic Centrality in Semantic Social Network1
: Query transformation is a serious hurdle on semantic peer-to-peer environment. For interoperability between peers, queries sent from a source peer have to be efficiently transfor...
Jason J. Jung
ENTCS
2007
101views more  ENTCS 2007»
13 years 8 months ago
Parametric Performance Contracts: Non-Markovian Loop Modelling and an Experimental Evaluation
Even with todays hardware improvements, performance problems are still common in many software systems. An approach to tackle this problem for component-based software architectur...
Heiko Koziolek, Viktoria Firus
JTAER
2006
109views more  JTAER 2006»
13 years 8 months ago
Shopping Online or Not? Cognition and Personality Matters
E-commerce has brought both opportunities and challenges to Internet marketers. One challenge facing the marketers is to "convert" Internet users who are reluctant to bu...
Sophia Wang, Simon Wang, Ming T. Wang
OL
2008
79views more  OL 2008»
13 years 8 months ago
A simpler and tighter redundant Klee-Minty construction
By introducing redundant Klee-Minty examples, we have previously shown that the central path can be bent along the edges of the Klee-Minty cubes, thus having 2n - 2 sharp turns in...
Eissa Nematollahi, Tamás Terlaky