Sciweavers

2864 search results - page 439 / 573
» Constraint Programming in OPL
Sort
View
KDD
2000
ACM
110views Data Mining» more  KDD 2000»
14 years 16 days ago
An empirical analysis of techniques for constructing and searching k-dimensional trees
Affordable, fast computers with large memories have lessened the demand for program efficiency, but applications such as browsing and searching very large databases often have rat...
Douglas A. Talbert, Douglas H. Fisher
ER
1995
Springer
109views Database» more  ER 1995»
14 years 15 days ago
Reverse Engineering of Relational Database Applications
Abstract. This paper presents techniques for reverse engineering of relational database applications. The target of such an effort is the definition of a fully equipped object-orie...
Mark W. W. Vermeer, Peter M. G. Apers
ISSS
1995
IEEE
115views Hardware» more  ISSS 1995»
14 years 15 days ago
A system level design methodology for the optimization of heterogeneous multiprocessors
This paper presents a system level design methodology and its implementation as CAD tool for the optimization of heterogeneous multiprocessor systems. These heterogeneous systems,...
Markus Schwiegershausen, Peter Pirsch
CPAIOR
2010
Springer
14 years 8 days ago
Hybrid Methods for the Multileaf Collimator Sequencing Problem
Abstract. The multileaf collimator sequencing problem is an important component of the effective delivery of intensity modulated radiotherapy used in the treatment of cancer. The p...
Hadrien Cambazard, Eoin O'Mahony, Barry O'Sullivan
BMVC
2001
13 years 11 months ago
Deformable Spatio-Temporal Shape Models: Extending ASM to 2D+Time
This paper extends 2D Active Shape Models to 2D+time by presenting a method for modelling and segmenting spatio-temporal shapes (ST-shapes). The modelling part consists of constru...
Ghassan Hamarneh, Tomas Gustavsson