Sciweavers

2864 search results - page 419 / 573
» Constraint Programming in OPL
Sort
View
MOR
2002
102views more  MOR 2002»
13 years 8 months ago
Facets of the Complementarity Knapsack Polytope
We present a polyhedral study of the complementarity knapsack problem. Traditionally, complementarity constraints are modeled by introducing auxiliary binary variables and additio...
Ismael R. de Farias Jr., Ellis L. Johnson, George ...
JOT
2010
114views more  JOT 2010»
13 years 7 months ago
Semantic Annotation for Java
This paper describes how to use annotation to provide semantic information. The applications include the automatic construction of a GUI so that the user input is constrained to a...
Douglas Lyon
PSD
2010
Springer
109views Database» more  PSD 2010»
13 years 7 months ago
A Tool for Analyzing and Fixing Infeasible RCTA Instances
Minimum-distance controlled tabular adjustment methods (CTA), and its restricted variants (RCTA), is a recent perturbative approach for tabular data protection. Given a table to be...
Jordi Castro, José A. González
TASLP
2010
98views more  TASLP 2010»
13 years 7 months ago
Trellis-Based Approaches to Rate-Distortion Optimized Audio Encoding
—Many important audio coding applications, such as streaming and playback of stored audio, involve offline compression. In such scenarios, encoding delays no longer represent a ...
Vinay Melkote, Kenneth Rose
CLOUDCOM
2010
Springer
13 years 7 months ago
Cost-Optimal Outsourcing of Applications into the Clouds
Abstract--Commercial services for provisioning software components and virtual infrastructure in the cloud are emerging. For customers, this creates a multitude of possibilities fo...
Immanuel Trummer, Frank Leymann, Ralph Mietzner, W...