Sciweavers

1512 search results - page 90 / 303
» When Suboptimal Rules
Sort
View
ICASSP
2011
IEEE
13 years 1 months ago
Beamforming design for multi-user two-way relaying with MIMO amplify and forward relays
Relays represent a promising approach to extend the cell coverage, combat the strong shadowing effects as well as guarantee the QoS in dense networks. Among the numerous existing ...
Jianshu Zhang, Florian Roemer, Martin Haardt
ICSE
2008
IEEE-ACM
14 years 10 months ago
Formal concept analysis applied to fault localization
One time-consuming task in the development of software is debugging. Recent work in fault localization crosschecks traces of correct and failing execution traces, it implicitly se...
Peggy Cellier
SOFSEM
2009
Springer
14 years 7 months ago
Expressiveness of Multiple Heads in CHR
Abstract. Constraint Handling Rules (CHR) is a general purpose, committedchoice declarative language which, differently from other similar languages, uses multi-headed (guarded) ru...
Cinzia Di Giusto, Maurizio Gabbrielli, Maria Chiar...
ACSC
2007
IEEE
14 years 4 months ago
On Inferences of Full Hierarchical Dependencies
Full hierarchical dependencies (FHDs) constitute a large class of relational dependencies. A relation exhibits an FHD precisely when it can be decomposed into at least two of its ...
Sven Hartmann, Sebastian Link
SACMAT
2003
ACM
14 years 3 months ago
Induced role hierarchies with attribute-based RBAC
The Role-Based Access Control (RBAC) model is traditionally used to manually assign users to appropriate roles. When the service-providing enterprise has a massive customer base, ...
Mohammad A. Al-Kahtani, Ravi S. Sandhu