Sciweavers

1920 search results - page 142 / 384
» The Range Constraint: Algorithms and Implementation
Sort
View
ICC
2007
IEEE
15 years 10 months ago
Utility Maximization for OFDMA Systems Over Discrete Sets
— The main task in OFDM downlink scheduling design is to maximize some kind of utility considering user specific as well as system induced constraints. A typical example is the ...
Chan Zhou, Gerhard Wunder, Thomas Michel
VLDB
2002
ACM
118views Database» more  VLDB 2002»
15 years 3 months ago
Translating Web Data
We present a novel framework for mapping between any combination of XML and relational schemas, in which a high-level, userspecified mapping is translated into semantically meanin...
Lucian Popa, Yannis Velegrakis, Renée J. Mi...
JFP
2008
97views more  JFP 2008»
15 years 2 months ago
HM(X) type inference is CLP(X) solving
The HM(X) system is a generalization of the Hindley/Milner system parameterized in the constraint domain X. Type inference is performed by generating constraints out of the progra...
Martin Sulzmann, Peter J. Stuckey
TACAS
2009
Springer
136views Algorithms» more  TACAS 2009»
15 years 11 months ago
Path Feasibility Analysis for String-Manipulating Programs
We discuss the problem of path feasibility for programs manipulating strings using a collection of standard string library functions. We prove results on the complexity of this pro...
Nikolaj Bjørner, Nikolai Tillmann, Andrei V...
CODASPY
2012
13 years 11 months ago
Comparison-based encryption for fine-grained access control in clouds
Access control is one of the most important security mechanisms in cloud computing. However, there has been little work that explores various comparison-based constraints for regu...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu, H...