Sciweavers

IOR
2008
90views more  IOR 2008»
13 years 11 months ago
Optimal Position-Based Warehouse Ordering in Divergent Two-Echelon Inventory Systems
: A continuous review two-echelon inventory system with a central warehouse and a number of non-identical retailers is considered. The retailers face independent Poisson demand and...
Sven Axsäter, Johan Marklund
IJPP
2008
148views more  IJPP 2008»
13 years 11 months ago
Analysis and Optimisation of Hierarchically Scheduled Multiprocessor Embedded Systems
We present an approach to the analysis and optimisation of heterogeneous multiprocessor embedded systems. The systems are heterogeneous not only in terms of hardware components, b...
Traian Pop, Paul Pop, Petru Eles, Zebo Peng
FUIN
2008
93views more  FUIN 2008»
13 years 11 months ago
Logic-based Conflict Detection for Distributed Policies
Policies are used to describe rules that are employed to modify (often distributed) system behaviour at runtime. Typically policies are created by many different people and there a...
Carlo Montangero, Stephan Reiff-Marganiec, Laura S...
EOR
2010
110views more  EOR 2010»
13 years 11 months ago
Online scheduling policies for multiclass call centers with impatient customers
We consider a call center with two classes of impatient customers: premium and regular classes. Modeling our call center as a multiclass GI/GI/s + M queue, we focus on developing ...
Oualid Jouini, Auke Pot, Ger Koole, Yves Dallery
COR
2008
116views more  COR 2008»
13 years 11 months ago
Supply disruptions with time-dependent parameters
We consider a firm that faces random demand and receives product from a single supplier who faces random supply. The supplier's availability may be affected by events such as...
Andrew M. Ross, Ying Rong, Lawrence V. Snyder
CORR
2010
Springer
130views Education» more  CORR 2010»
13 years 11 months ago
Towards Adaptable and Adaptive Policy-Free Middleware
We believe that to fully support adaptive distributed applications, middleware must itself be adaptable, adaptive and policy-free. In this paper we present a new language-independ...
Alan Dearle, Graham N. C. Kirby, Stuart J. Norcros...
FIS
2010
13 years 11 months ago
A Provenance-Based Compliance Framework
Given the significant amount of personal information available on the Web, verifying its correct use emerges as an important issue. When personal information is published, it shoul...
Rocío Aldeco-Pérez, Luc Moreau
CCS
2010
ACM
13 years 11 months ago
DIFC programs by automatic instrumentation
Decentralized information flow control (DIFC) operating systems provide applications with mechanisms for enforcing information-flow policies for their data. However, significant o...
William R. Harris, Somesh Jha, Thomas W. Reps
ATAL
2010
Springer
13 years 11 months ago
Incremental plan aggregation for generating policies in MDPs
Despite the recent advances in planning with MDPs, the problem of generating good policies is still hard. This paper describes a way to generate policies in MDPs by (1) determiniz...
Florent Teichteil-Königsbuch, Ugur Kuter, Gui...
ASM
2010
ASM
13 years 11 months ago
Matelas: A Predicate Calculus Common Formal Definition for Social Networking
This paper presents Matelas, a B predicate calculus definition for social networking, modelling social-network content, privacy policies, social-networks friendship relations, and ...
Néstor Cataño, Camilo Rueda