Sciweavers

12194 search results - page 121 / 2439
» cans 2010
Sort
View
IJITWE
2010
118views more  IJITWE 2010»
13 years 7 months ago
Critical Path Based Approach for Predicting Temporal Exceptions in Resource Constrained Concurrent Workflows
Departmental workflows within a digital business ecosystem are often executed concurrently and required to share limited number of resources. However, unexpected events from the b...
Iok-Fai Leong, Yain-Whar Si, Robert P. Biuk-Aghai
IJKESDP
2010
94views more  IJKESDP 2010»
13 years 7 months ago
Rule acquisition for cognitive agents by using estimation of distribution algorithms
Cognitive Agents must be able to decide their actions based on their recognized states. In general, learning mechanisms are equipped for such agents in order to realize intellgent ...
Tokue Nishimura, Hisashi Handa
IJUFKS
2010
77views more  IJUFKS 2010»
13 years 7 months ago
How to Handle Interval solutions for Cooperative Interval Games
Interval uncertainty affects our decision making activities on a daily basis making the data structure of intervals of real numbers more and more popular in theoretical models and...
Rodica Branzei, Stef Tijs, S. Z. Alparslan Gö...
IMCSIT
2010
13 years 7 months ago
Generation of First-Order Expressions from a Broad Coverage HPSG Grammar
This paper describes an application for computing first-order semantic representations of English texts. It is based on a combination of hybrid shallow-deep components arranged wit...
Ravi Coote, Andreas Wotzlaw
INFORMATICALT
2010
170views more  INFORMATICALT 2010»
13 years 7 months ago
A Provably Secure Proxy Signature Scheme in Certificateless Cryptography
A proxy signature scheme enables an original signer to delegate its signing capability to a proxy signer and then the proxy signer can sign a message on behalf of the original sign...
Hu Xiong, Fagen Li, Zhiguang Qin