Sciweavers

32 search results - page 3 / 7
» The set constraint CFL reachability connection in practice
Sort
View
INFOCOM
2010
IEEE
13 years 3 months ago
Pricing under Constraints in Access Networks: Revenue Maximization and Congestion Management
Abstract—This paper investigates pricing of Internet connectivity services in the context of a monopoly ISP selling broadband access to consumers. We first study the optimal com...
Prashanth Hande, Mung Chiang, A. Robert Calderbank...
ICDT
2007
ACM
105views Database» more  ICDT 2007»
13 years 9 months ago
Unlocking Keys for XML Trees
Abstract. We review key constraints in the context of XML as introduced by Buneman et al. We show that one of the proposed inference rules is not sound in general, and the axiomati...
Sven Hartmann, Sebastian Link
TROB
2010
83views more  TROB 2010»
13 years 3 months ago
Passive-Set-Position-Modulation Framework for Interactive Robotic Systems
—We propose a novel framework, passive set-position modulation (PSPM), which enables us to connect a (continuoustime) robot’s position to a sequence of slowly-updating/sparse (...
Dongjun Lee, Ke Huang
DAC
1997
ACM
13 years 9 months ago
More Practical Bounded-Skew Clock Routing
: Academic clock routing research results has often had limited impact on industry practice, since such practical considerations as hierarchical buffering, rise-time and overshoot ...
Andrew B. Kahng, Chung-Wen Albert Tsao
SSDBM
2010
IEEE
185views Database» more  SSDBM 2010»
13 years 3 months ago
DESSIN: Mining Dense Subgraph Patterns in a Single Graph
Currently, a large amount of data can be best represented as graphs, e.g., social networks, protein interaction networks, etc. The analysis of these networks is an urgent research ...
Shirong Li, Shijie Zhang, Jiong Yang