Sciweavers

1024 search results - page 65 / 205
» Value complete, column complete, predicate complete
Sort
View
CSCLP
2004
Springer
15 years 9 months ago
Better Propagation for Non-preemptive Single-Resource Constraint Problems
Abstract. Overload checking, forbidden regions, edge finding, and notfirst/not-last detection are well-known propagation rules to prune the start times of activities which have t...
Armin Wolf
ICDE
1997
IEEE
121views Database» more  ICDE 1997»
16 years 5 months ago
A Persistent Hyper-Programming System
We demonstrate the use of a hyper-programming system in building persistent applications. This allows program representations to contain type-safe links to persistent objects embe...
Graham N. C. Kirby, Ronald Morrison, David S. Munr...
ICIP
2006
IEEE
15 years 10 months ago
Public Key Watermarking for Reversible Image Authentication
In this paper, we propose a new public key watermarking scheme for reversible image authentication where if the image is authentic, the distortion due to embedding can be complete...
Sang-Kwang Lee, Young-Ho Suh, Yo-Sung Ho
NOMS
2006
IEEE
113views Communications» more  NOMS 2006»
15 years 10 months ago
Business-Oriented Capacity Planning of IT Infrastructure to Handle Load Surges
— This work proposes a business-oriented approach to designing IT infrastructure in an e-commerce context subject to load surges. The main difference between the proposed approac...
Filipe Marques, Jacques Philippe Sauvé, Ant...
LICS
2000
IEEE
15 years 8 months ago
Game Semantics and Subtyping
While Game Semantics has been remarkably successful at g, often in a fully abstract manner, a wide range of features of programming languages, there has to date been no attempt at...
Juliusz Chroboczek