Sciweavers

1920 search results - page 136 / 384
» The Range Constraint: Algorithms and Implementation
Sort
View
ICCAD
2006
IEEE
189views Hardware» more  ICCAD 2006»
16 years 29 days ago
Allocation cost minimization for periodic hard real-time tasks in energy-constrained DVS systems
Energy-efficiency and power-awareness for electronic systems have been important design issues in hardware and software implementations. We consider the scheduling of periodic ha...
Jian-Jia Chen, Tei-Wei Kuo
CADE
2011
Springer
14 years 4 months ago
Exploiting Symmetry in SMT Problems
Abstract. Methods exploiting problem symmetries have been very successful in several areas including constraint programming and SAT solving. We here recast a technique to enhance t...
David Déharbe, Pascal Fontaine, Stephan Mer...
ICIP
2002
IEEE
16 years 5 months ago
Affine transformation resistant watermarking based on image normalization
Geometric attacks are among the most challenging problems in present day watermarking. Such attacks are very simple to implement yet they can defeat most of the existing watermark...
Ping Dong, Nikolas P. Galatsanos
SPIN
2005
Springer
15 years 9 months ago
Repairing Structurally Complex Data
We present a novel algorithm for repairing structurally complex data. Given an assertion that represents desired structural integrity constraints and a structure that violates them...
Sarfraz Khurshid, Iván García, Yuk L...
TEC
2010
112views more  TEC 2010»
14 years 10 months ago
Population-Based Algorithm Portfolios for Numerical Optimization
In this paper, we consider the scenario that a population-based algorithm is applied to a numerical optimization problem and a solution needs to be presented within a given time bu...
Fei Peng, Ke Tang, Guoliang Chen, Xin Yao