Sciweavers

2412 search results - page 379 / 483
» Which Problems Have Strongly Exponential Complexity
Sort
View
103
Voted
ICECCS
1997
IEEE
99views Hardware» more  ICECCS 1997»
15 years 6 months ago
The Butterfly Methodology : A Gateway-free Approach for Migrating Legacy Information Systems
The problems posed by mission-critical legacy systems - e.g., brittleness, inflexibility, isolation, non-extensibility, lack of openness - are well known, but practical solutions ...
Bing Wu, Deirdre Lawless, Jesus Bisbal, Ray Richar...
MAAMAW
1993
Springer
15 years 6 months ago
Coalition Formation Among Autonomous Agents
Autonomous agents working in multi-agent environments may need to cooperate in order to ful ll tasks. Given a set of agents and a set of tasks which they have to satisfy, we consi...
Steven P. Ketchpel
128
Voted
CVPR
2009
IEEE
15 years 6 months ago
High-quality curvelet-based motion deblurring from an image pair
One promising approach to remove motion deblurring is to recover one clear image using an image pair. Existing dual-image methods require an accurate image alignment between the i...
Jian-Feng Cai, Hui Ji, Chaoqiang Liu, Zuowei Shen
124
Voted
EUROPAR
2004
Springer
15 years 6 months ago
Imprecise Exceptions in Distributed Parallel Components
Abstract. Modern microprocessors have sacrificed the exactness of exceptions for improved performance long ago. This is a side effect of reordering instructions so that the micropr...
Kostadin Damevski, Steven G. Parker
136
Voted
ETRICS
2006
15 years 6 months ago
An Algebra for Enterprise Privacy Policies Closed Under Composition and Conjunction
To cope with the complex requirements imposed on the processing of privacy-sensitive data within enterprises, the use of automatic or semi-automatic tools is gradually becoming in...
Dominik Raub, Rainer Steinwandt