Sciweavers

2354 search results - page 428 / 471
» Assignment Problems
Sort
View
CASES
2001
ACM
14 years 1 months ago
Storage allocation for embedded processors
In an embedded system, it is common to have several memory areas with different properties, such as access time and size. An access to a specific memory area is usually restricted...
Jan Sjödin, Carl von Platen
FUN
2010
Springer
230views Algorithms» more  FUN 2010»
14 years 1 months ago
Scheduling with Bully Selfish Jobs
In job scheduling with precedence constraints, i j means that job j cannot start being processed before job i is completed. In this paper we consider selfish bully jobs who do no...
Tami Tamir
FLAIRS
2007
14 years 7 days ago
The Evolution and Evaluation of an Internet Search Tool for Information Analysts
We are working on a project aimed at building next generation analyst support tools that focus analysts’ attention on the most critical and novel information found within the da...
Elizabeth T. Whitaker, Robert L. Simpson Jr.
SDM
2010
SIAM
144views Data Mining» more  SDM 2010»
13 years 11 months ago
Predictive Modeling with Heterogeneous Sources
Lack of labeled training examples is a common problem for many applications. In the same time, there is usually an abundance of labeled data from related tasks. But they have diff...
Xiaoxiao Shi, Qi Liu, Wei Fan, Qiang Yang, Philip ...
GRAPHICSINTERFACE
2008
13 years 11 months ago
Background estimation from non-time sequence images
We address the problem of reconstructing the background of a scene from a set of photographs featuring several occluding objects. We assume that the photographs are obtained from ...
Miguel Granados, Hans-Peter Seidel, Hendrik P. A. ...