Sciweavers

639 search results - page 111 / 128
» Dominance Constraints with Set Operators
Sort
View
WINET
2010
120views more  WINET 2010»
13 years 5 months ago
Link adaptation algorithms for improved delivery of delay- and error-sensitive packet-data services over wireless networks
Abstract Link Adaptation is a radio resource management technique that assesses the channel conditions and selects a transport mode, from a set of possible options, which is optimi...
Miguel López-Benítez, Javier Goz&aac...
ACL
2010
13 years 5 months ago
Towards Robust Multi-Tool Tagging. An OWL/DL-Based Approach
This paper describes a series of experiments to test the hypothesis that the parallel application of multiple NLP tools and the integration of their results improves the correctne...
Christian Chiarcos
ERSA
2010
187views Hardware» more  ERSA 2010»
13 years 5 months ago
An Open Source Circuit Library with Benchmarking Facilities
In this paper, we introduce the open-source PivPav backend tool for reconfigurable computing. Essentially, PivPav provides an interface to a library of digital circuits that are ke...
Mariusz Grad, Christian Plessl
ICSOC
2010
Springer
13 years 5 months ago
Automatic Fragment Identification in Workflows Based on Sharing Analysis
In Service-Oriented Computing (SOC), fragmentation and merging of workflows are motivated by a number of concerns, among which we can cite design issues, performance, and privacy. ...
Dragan Ivanovic, Manuel Carro, Manuel V. Hermenegi...
ICASSP
2011
IEEE
12 years 11 months ago
Image editing based on Sparse Matrix-Vector multiplication
This paper presents a unified model for image editing in terms of Sparse Matrix-Vector (SpMV) multiplication. In our framework, we cast image editing as a linear energy minimizat...
Ying Wang, Hongping Yan, Chunhong Pan, Shiming Xia...