Sciweavers

28 search results - page 5 / 6
» Introduction: Special Issue on Distributed Constraint Satisf...
Sort
View
ATS
2001
IEEE
126views Hardware» more  ATS 2001»
13 years 9 months ago
Design of an Optimal Test Access Architecture Using a Genetic Algorithm
Test access is a major problem for core-based systemon-chip (SOC) designs. Since cores in an SOC are not directly accessible via chip inputs and outputs, special access mechanisms...
Zahra Sadat Ebadi, André Ivanov
CP
2006
Springer
13 years 9 months ago
Dynamic Symmetry Breaking Restarted
ion of a given partial assignment of values to variables. Compared with other symmetry breaking techniques, the big advantage of dynamic symmetry breaking is that it can accommodat...
Daniel S. Heller, Meinolf Sellmann
COLCOM
2007
IEEE
13 years 11 months ago
Towards trust-aware access management for ad-hoc collaborations
—In an ad-hoc collaborative sharing environment, attribute-based access control provides a promising approach in defining authorization over shared resources based on users’ p...
Jing Jin, Gail-Joon Ahn, Mohamed Shehab, Hongxin H...
ITA
2006
163views Communications» more  ITA 2006»
13 years 5 months ago
Graph fibrations, graph isomorphism, and PageRank
PageRank is a ranking method that assigns scores to web pages using the limit distribution of a random walk on the web graph. A fibration of graphs is a morphism that is a local i...
Paolo Boldi, Violetta Lonati, Massimo Santini, Seb...
TMI
2008
116views more  TMI 2008»
13 years 5 months ago
Dynamic PET Reconstruction Using Wavelet Regularization With Adapted Basis Functions
Tomographic reconstruction from positron emission tomography (PET) data is an ill-posed problem that requires regularization. An attractive approach is to impose an 1-regularizatio...
J. Verhaeghe, Dimitri Van De Ville, I. Khalidov, Y...