Sciweavers

2864 search results - page 286 / 573
» Constraint Programming in OPL
Sort
View
JOTA
2011
78views more  JOTA 2011»
13 years 16 days ago
Outer Trust-Region Method for Constrained Optimization
Given an algorithm A for solving some mathematical problem based on the iterative solution of simpler subproblems, an Outer Trust-Region (OTR) modification of A is the result of ...
Ernesto G. Birgin, Emerson V. Castelani, Andr&eacu...
JMLR
2012
12 years 3 days ago
Maximum Margin Temporal Clustering
Temporal Clustering (TC) refers to the factorization of multiple time series into a set of non-overlapping segments that belong to k temporal clusters. Existing methods based on e...
Minh Hoai Nguyen, Fernando De la Torre
GPCE
2007
Springer
14 years 3 months ago
Safe composition of product lines
Programs of a software product line can be synthesized by composing modules that implement features. Besides high-level domain constraints that govern the compatibility of feature...
Sahil Thaker, Don S. Batory, David Kitchin, Willia...
ECOOP
1994
Springer
14 years 1 months ago
Real-Time Specification Inheritance Anomalies and Real-Time Filters
Real-time programs are, in general, difficult to design and verify. The inheritance mechanism can be useful in reusing well-defined and verified real-time programs. In application...
Mehmet Aksit, Jan Bosch, William van der Sterren, ...
AIPS
1994
13 years 11 months ago
Using AI Planning Techniques to Automatically Generate Image Processing Procedures
This paper describes work on the Multimission VICARPlanner (MVP) system to automatically construct executable imageprocessing procedures for custom image processing requests for t...
Steve A. Chien