Sciweavers

1963 search results - page 287 / 393
» Applications of Preferences using Answer Set Programming
Sort
View
AIPS
1996
13 years 10 months ago
Building a Planner for Information Gathering: A Report from the Trenches
Informationgathering requires locating and integrating data froma set of distributed informationsources. These sources maycontain overlapping data and can comefrom different types...
Craig A. Knoblock
EOR
2007
113views more  EOR 2007»
13 years 8 months ago
Duality for location problems with unbounded unit balls
Abstract. Given an optimization problem with a composite of a convex and componentwise increasing function with a convex vector function as objective function, by means of the conj...
Gert Wanka, Radu Ioan Bot, Emese Vargyas
CARDIS
2008
Springer
113views Hardware» more  CARDIS 2008»
13 years 10 months ago
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...
MVA
2007
158views Computer Vision» more  MVA 2007»
13 years 8 months ago
Hybrid object labelling in digital images
The application of a technique for labelling connected components based on the classical recursive technique is studied. The recursive approach permits labelling, counting, and cha...
Julio Martín-Herrero
WWW
2009
ACM
14 years 9 months ago
RuralCafe: web search in the rural developing world
The majority of people in rural developing regions do not have access to the World Wide Web. Traditional network connectivity technologies have proven to be prohibitively expensiv...
Jay Chen, Lakshminarayanan Subramanian, Jinyang Li