Sciweavers

5 search results - page 1 / 1
» Toward a Generalization of Rough Sets Based on Active and Pa...
Sort
View
JACIII
2006
44views more  JACIII 2006»
13 years 8 months ago
Toward a Generalization of Rough Sets Based on Active and Passive Relations
Masashi Emoto, Rolly Intan, Masao Mukaidono
DATE
2009
IEEE
123views Hardware» more  DATE 2009»
14 years 3 months ago
On decomposing Boolean functions via extended cofactoring
—We investigate restructuring techniques based on decomposition/factorization, with the objective to move critical signals toward the output while minimizing area. A specific ap...
Anna Bernasconi, Valentina Ciriani, Gabriella Truc...
GRC
2008
IEEE
13 years 9 months ago
Scalar-product based Secure Two-party Computation
—Secure multiparty computation is a very important research topic in cryptography. A secure multi-party computation involves N untrusful parties. It takes input xi from the ith p...
Chih-Hao Shen, Justin Zhan, Tsan-sheng Hsu, Churn-...
HEURISTICS
2002
152views more  HEURISTICS 2002»
13 years 8 months ago
A Constraint-Based Method for Project Scheduling with Time Windows
This paper presents a heuristic algorithm for solving RCPSP/max, the resource constrained project scheduling problem with generalized precedence relations. The algorithm relies, a...
Amedeo Cesta, Angelo Oddi, Stephen F. Smith
MOBICOM
2010
ACM
13 years 9 months ago
Inferring and mitigating a link's hindering transmissions in managed 802.11 wireless networks
In 802.11 managed wireless networks, the manager can address under-served links by rate-limiting the conflicting nodes. In order to determine to what extent each conflicting node ...
Eugenio Magistretti, Omer Gurewitz, Edward W. Knig...