Sciweavers

2976 search results - page 490 / 596
» On the bounded integer programming
Sort
View
EDBT
1992
ACM
79views Database» more  EDBT 1992»
13 years 12 months ago
Theoretical Aspects of Schema Merging
A general technique for merging database schemas is developed that has a number of advantages over existing techniques, the most important of which is that schemas are placed in a...
Peter Buneman, Susan B. Davidson, Anthony Kosky
AGILEDC
2004
IEEE
13 years 11 months ago
Taming the Embedded Tiger - Agile Test Techniques for Embedded Software
Strong unit testing is the foundation of agile software development but embedded systems present special problems. Test of embedded software is bound up with test of hardware, cro...
Nancy Van Schooenderwoert, Ron Morsicato
CP
2006
Springer
13 years 11 months ago
Constraint Based Resilience Analysis
Abstract. In this paper we give an overview of applications of Constraint Programming for IP (Internet Protocol) data networks, and discuss the problem of Resilience Analysis in mo...
Helmut Simonis
HYBRID
2000
Springer
13 years 11 months ago
Controlled Invariance of Discrete Time Systems
Abstract. An algorithm for computing the maximal controlled invariant set and the least restrictive controller for discrete time systems is proposed. We show how the algorithm can ...
René Vidal, Shawn Schaffert, John Lygeros, ...
VW
2000
Springer
13 years 11 months ago
A Framework to Dynamically Manage Distributed Virtual Environments
Abstract. In this paper, we present the project Urbi et Orbi, a framework to dynamically manage distributed virtual environments (DVEs). This framework relies on a dedicated script...
Yoann Fabre, Guillaume Pitel, Laurent Soubrevilla,...