Sciweavers

459 search results - page 41 / 92
» A heuristic approach for multiple restricted multiplication
Sort
View
DATE
2008
IEEE
131views Hardware» more  DATE 2008»
14 years 2 months ago
Scheduling of Fault-Tolerant Embedded Systems with Soft and Hard Timing Constraints
In this paper we present an approach to the synthesis of fault-tolerant schedules for embedded applications with soft and hard real-time constraints. We are interested to guarante...
Viacheslav Izosimov, Paul Pop, Petru Eles, Zebo Pe...
WABI
2004
Springer
132views Bioinformatics» more  WABI 2004»
14 years 1 months ago
Joint Analysis of DNA Copy Numbers and Gene Expression Levels
Abstract. Genomic instabilities, amplifications, deletions and translocations are often observed in tumor cells. In the process of cancer pathogenesis cells acquire multiple genom...
Doron Lipson, Amir Ben-Dor, Elinor Dehan, Zohar Ya...
AAMAS
2005
Springer
13 years 7 months ago
Efficient Management of Multi-Linked Negotiation Based on a Formalized Model
A Multi-linked negotiation problem occurs when an agent needs to negotiate with multiple other agents about different subjects (tasks, conflicts, or resource requirements), and th...
Xiaoqin Zhang, Victor R. Lesser, Sherief Abdallah
EOR
2008
123views more  EOR 2008»
13 years 7 months ago
A combined approach for segment-specific market basket analysis
Market baskets arise from consumers' shopping trips and include items from multiple categories that are frequently chosen interdependently from each other. Explanatory models...
Yasemin Boztug, Thomas Reutterer
CVPR
2008
IEEE
14 years 9 months ago
Discovering class specific composite features through discriminative sampling with Swendsen-Wang Cut
This paper proposes a novel approach to discover a set of class specific "composite features" as the feature pool for the detection and classification of complex objects...
Feng Han, Ying Shan, Harpreet S. Sawhney, Rakesh K...