Sciweavers

933 search results - page 186 / 187
» Extending Forward Checking
Sort
View
CONSTRAINTS
2007
100views more  CONSTRAINTS 2007»
13 years 5 months ago
Design of Financial CDO Squared Transactions Using Constraint Programming
We give an approximate and often extremely fast method of building a particular kind of portfolio in finance, here called a portfolio design (PD), with applications in the credit ...
Pierre Flener, Justin Pearson, Luis G. Reyna, Olof...
TCS
2008
13 years 5 months ago
Role-based access control for boxed ambients
Our society is increasingly moving towards richer forms of information exchange where mobility of processes and devices plays a prominent role. This tendency has prompted the acad...
Adriana B. Compagnoni, Elsa L. Gunter, Philippe Bi...
UMUAI
2008
144views more  UMUAI 2008»
13 years 5 months ago
Tag-based user modeling for social multi-device adaptive guides
This paper aims to demonstrate that the principles of adaptation and user modeling, especially social annotation, can be integrated fruitfully with those of the Web 2.0 paradigm a...
Francesca Carmagnola, Federica Cena, Luca Console,...
TCAD
1998
86views more  TCAD 1998»
13 years 4 months ago
Fast heuristic and exact algorithms for two-level hazard-free logic minimization
None of the available minimizers for 2-level hazard-free logic minimization can synthesize very large circuits. This limitation has forced researchers to resort to manual and auto...
Michael Theobald, Steven M. Nowick
JAIR
2010
160views more  JAIR 2010»
13 years 3 months ago
Reasoning About the Transfer of Control
We present DCL-PC: a logic for reasoning about how the abilities of agents and coalitions of agents are altered by transferring control from one agent to another. The logical foun...
Wiebe van der Hoek, Dirk Walther, Michael Wooldrid...