Sciweavers

1749 search results - page 299 / 350
» Logic, Optimization, and Constraint Programming
Sort
View
NETWORKING
2008
13 years 9 months ago
Traffic Engineering and Routing in IP Networks with Centralized Control
There have been research initiatives in centralized control recently, which advocate that the control of an autonomous system (AS) should be performed in a centralized fashion. In ...
Jing Fu, Peter Sjödin, Gunnar Karlsson
ECAI
2010
Springer
13 years 8 months ago
ISAC - Instance-Specific Algorithm Configuration
We present a new method for instance-specific algorithm configuration (ISAC). It is based on the integration of the algorithm configuration system GGA and the recently proposed sto...
Serdar Kadioglu, Yuri Malitsky, Meinolf Sellmann, ...
CPAIOR
2009
Springer
13 years 8 months ago
Max Energy Filtering Algorithm for Discrete Cumulative Resources
Abstract. In scheduling using constraint programming we usually reason only about possible start times and end times of activities and remove those which are recognized as unfeasib...
Petr Vilím
JSAC
2008
95views more  JSAC 2008»
13 years 6 months ago
Cognitive Medium Access: Constraining Interference Based on Experimental Models
In this paper we design a cognitive radio that can coexist with multiple parallel WLAN channels while abiding by an interference constraint. The interaction between both systems is...
Stefan Geirhofer, Lang Tong, Brian M. Sadler
DATE
1999
IEEE
120views Hardware» more  DATE 1999»
14 years 2 days ago
Hardware Synthesis from C/C++ Models
Software programming languages, such as C/C++, have been used as means for specifying hardware for quite a while. Different design methodologies have exploited the advantages of f...
Giovanni De Micheli