Sciweavers

1320 search results - page 223 / 264
» Efficient Implementation of a Linear Logic Programming Langu...
Sort
View
HEURISTICS
2008
136views more  HEURISTICS 2008»
13 years 6 months ago
Enhancing set constraint solvers with lexicographic bounds
Since their beginning in constraint programming, set solvers have been applied to a wide range of combinatorial search problems, such as bin-packing, set partitioning, circuit desi...
Andrew Sadler, Carmen Gervet
IPPS
2009
IEEE
14 years 2 months ago
High-level estimation and trade-off analysis for adaptive real-time systems
We propose a novel design estimation method for adaptive streaming applications to be implemented on a partially reconfigurable FPGA. Based on experimental results we enable accu...
Ingo Sander, Jun Zhu, Axel Jantsch, Andreas Herrho...
IEEESCC
2006
IEEE
14 years 1 months ago
Applying Distributed Business Rules - The VIDRE Approach
Today’s business processes are not static, they need to be adapted frequently to reflect changing business requirements. Several business process languages such as WS-BPEL have...
Florian Rosenberg, Christoph Nagl, Schahram Dustda...
ICALP
2009
Springer
14 years 8 months ago
Improved Algorithms for Latency Minimization in Wireless Networks
In the interference scheduling problem, one is given a set of n communication requests described by sourcedestination pairs of nodes from a metric space. The nodes correspond to d...
Alexander Fanghänel, Berthold Vöcking, T...
ASPLOS
2009
ACM
14 years 8 months ago
Anomaly-based bug prediction, isolation, and validation: an automated approach for software debugging
Software defects, commonly known as bugs, present a serious challenge for system reliability and dependability. Once a program failure is observed, the debugging activities to loc...
Martin Dimitrov, Huiyang Zhou