Sciweavers

7092 search results - page 1260 / 1419
» Parallelizing constraint programs
Sort
View
TPDS
2008
72views more  TPDS 2008»
13 years 8 months ago
Replica Placement and Access Policies in Tree Networks
In this paper, we discuss and compare several policies to place replicas in tree networks, subject to server capacity and Quality of Service (QoS) constraints. The client requests ...
Anne Benoit, Veronika Rehn-Sonigo, Yves Robert
TSE
2008
113views more  TSE 2008»
13 years 8 months ago
Discovering Neglected Conditions in Software by Mining Dependence Graphs
Neglected conditions are an important but difficult-to-find class of software defects. This paper presents a novel approach for revealing neglected conditions that integrates stati...
Ray-Yaung Chang, Andy Podgurski, Jiong Yang
JSAC
2007
147views more  JSAC 2007»
13 years 8 months ago
Cross-Layer Optimization for Video Summary Transmission over Wireless Networks
Abstract— Video summarization has gained increased popularity in the emerging multimedia communication applications, however, very limited work has been conducted to address the ...
Dalei Wu, Song Ci, Haohong Wang
AIL
2004
113views more  AIL 2004»
13 years 8 months ago
On the Ontological Status of Plans and Norms
This article describes an ontological model of norms. The basic assumption is that a substantial part of a legal system is grounded on the concept of agency. Since a legal system a...
Guido Boella, Leonardo Lesmo, Rossana Damiano
TWC
2008
98views more  TWC 2008»
13 years 8 months ago
Resource Allocation for Delay Differentiated Traffic in Multiuser OFDM Systems
Abstract-- Most existing work on adaptive allocation of subcarriers and power in multiuser OFDM systems has focused on homogeneous traffic consisting of delay-constrained data (gua...
Meixia Tao, Ying-Chang Liang, Fan Zhang
« Prev « First page 1260 / 1419 Last » Next »