Sciweavers

267 search results - page 12 / 54
» his 2008
Sort
View
CPC
2008
86views more  CPC 2008»
13 years 8 months ago
Enumeration Schemes for Restricted Permutations
Abstract. Zeilberger's enumeration schemes can be used to completely automate the enumeration of many permutation classes. We extend his enumeration schemes so that they apply...
Vincent Vatter
IADIS
2003
13 years 11 months ago
User Profile Based Smart Information Filtering in Smartcard
Finding effectively relevant information is becoming challenging task. In this paper, we propose a smart information filtering system SIM-Filter that integrates user’s identity ...
Abdelkrim Lahlou, Pascal Urien
EAAI
2008
115views more  EAAI 2008»
13 years 9 months ago
Supply chain coordination: A game-theory approach
In a supply chain organized as a network of autonomous enterprises, the main objective of each partner is to optimize his production and supply policy with respect to his own econ...
Jean-Claude Hennet, Yasemin Arda
ISSA
2008
13 years 11 months ago
Immune System Based Intrusion Detection System
The threats and intrusions in IT systems can basically be compared to human diseases with the difference that the human body has an effective way to deal with them, what still nee...
Christoph Ehret, Ulrich Ultes-Nitsche
ACMICEC
2008
ACM
220views ECommerce» more  ACMICEC 2008»
13 years 11 months ago
Registering UML models for global and local choreographies
A local choreography describes how a business partner - from his perspective - interacts with other business partners. If local choreographies are developed in isolation, the loca...
Birgit Hofreiter