Sciweavers

325 search results - page 51 / 65
» Analysis of the constraint proposal method for two-party neg...
Sort
View
CIKM
2004
Springer
14 years 24 days ago
Processing content-oriented XPath queries
Document-centric XML collections contain text-rich documents, marked up with XML tags that add lightweight semantics to the text. Querying such collections calls for a hybrid quer...
Börkur Sigurbjörnsson, Jaap Kamps, Maart...
GECCO
2006
Springer
162views Optimization» more  GECCO 2006»
13 years 11 months ago
Improving evolutionary real-time testing
Embedded systems are often used in a safety-critical context, e.g. in airborne or vehicle systems. Typically, timing constraints must be satisfied so that real-time embedded syste...
Marouane Tlili, Stefan Wappler, Harmen Sthamer
GLOBECOM
2007
IEEE
14 years 1 months ago
Robust Optimization for Selecting NetFlow Points of Measurement in an IP Network
— NetFlow is a solution to make an in-depth traffic analysis possible in IP networks. Most of the telecommunication operators have already deployed it, or intend to do so, for n...
Mustapha Bouhtou, Olivier Klopfenstein
ECCV
2002
Springer
14 years 9 months ago
Diffuse-Specular Separation and Depth Recovery from Image Sequences
Specular reflections present difficulties for many areas of computer vision such as stereo and segmentation. To separate specular and diffuse reflection components, previous approa...
Stephen Lin, Yuanzhen Li, Sing Bing Kang, Xin Tong...
ICCD
2006
IEEE
137views Hardware» more  ICCD 2006»
14 years 4 months ago
Reduction of Crosstalk Pessimism using Tendency Graph Approach
— Accurate estimation of worst-case crosstalk effects is critical for a realistic estimation of the worst-case behavior of deep sub-micron circuits. Crosstalk analysis models usu...
Murthy Palla, Klaus Koch, Jens Bargfrede, Manfred ...