Sciweavers

JSS
2006
116views more  JSS 2006»
14 years 1 days ago
Methodology for customer relationship management
The importance and presence of technological solutions in organizations supporting CRM are a vital business fact from the late nineties. Presently, the manufacturers figure in the...
Ricardo Chalmeta
JSC
2006
147views more  JSC 2006»
14 years 1 days ago
An algorithm to solve integer linear systems exactly using numerical methods
In this paper, we present a new algorithm for the exact solutions of linear systems with integer coefficients using numerical methods. It terminates with the correct answer in wel...
Zhendong Wan
ENVSOFT
2007
78views more  ENVSOFT 2007»
14 years 1 days ago
CREDOS: A Conservation Reserve Evaluation And Design Optimisation System
A number of spatial decision support systems (SDSSs) are already available for the systematic planning of conservation reserves. These existing systems offer varying levels of int...
Neville D. Crossman, Lyall M. Perry, Brett A. Brya...
JCO
2006
234views more  JCO 2006»
14 years 2 days ago
Coverage by directional sensors in randomly deployed wireless sensor networks
We study a novel "coverage by directional sensors" problem with tunable orientations on a set of discrete targets. We propose a Maximum Coverage with Minimum Sensors (MCM...
Jing Ai, Alhussein A. Abouzeid
ISI
2006
Springer
14 years 2 days ago
DrillSim: A Simulation Framework for Emergency Response Drills
Responding to natural or man-made disasters in a timely and effective manner can reduce deaths and injuries, contain or prevent secondary disasters, and reduce the resulting econom...
Vidhya Balasubramanian, Daniel Massaguer, Sharad M...
IIE
2008
58views more  IIE 2008»
14 years 3 days ago
The Unfortunate Novice Theme of Direct Transformation
In many occasions, the text describing an algorithmic task may entail a rather intuitive, operational solution scheme. Yet, such a scheme may not necessarily be efficient or correc...
David Ginat
COMCOM
2006
154views more  COMCOM 2006»
14 years 4 days ago
Minimum-cost network hardening using attack graphs
In defending one's network against cyber attack, certain vulnerabilities may seem acceptable risks when considered in isolation. But an intruder can often infiltrate a seemin...
Lingyu Wang, Steven Noel, Sushil Jajodia
APPML
2006
79views more  APPML 2006»
14 years 5 days ago
A note on a symmetry analysis and exact solutions of a nonlinear fin equation
A similarity analysis of a nonlinear fin equation has been carried out by M. Pakdemirli and A.Z. Sahin [Similarity analysis of a nonlinear fin equation, Appl. Math. Lett. (2005) (...
Ashfaque H. Bokhari, Abdul Hamid Kara, F. D. Zaman
EOR
2008
162views more  EOR 2008»
14 years 5 days ago
Simple bounds and greedy algorithms for decomposing a flow into a minimal set of paths
Given arbitrary source and target nodes s, t and an s
Benedicte Vatinlen, Fabrice Chauvet, Philippe Chr&...
ANOR
2006
59views more  ANOR 2006»
14 years 5 days ago
The empirical behavior of sampling methods for stochastic programming
Abstract. We investigate the quality of solutions obtained from sample-average approximations to two-stage stochastic linear programs with recourse. We use a recently developed sof...
Jeff Linderoth, Alexander Shapiro, Stephen Wright