Sciweavers

23 search results - page 4 / 5
» Validated Evaluation of Special Mathematical Functions
Sort
View
CHI
2008
ACM
14 years 6 months ago
CareLog: a selective archiving tool for behavior management in schools
Identifying the function of problem behavior can lead to the development of more effective interventions. One way to identify the function is through functional behavior assessmen...
Gillian R. Hayes, Lamar M. Gardere, Gregory D. Abo...
AIPS
2010
13 years 6 months ago
A New Approach to Conformant Planning Using CNF*
In this paper, we develop a heuristic, progression based conformant planner, called CNF, which represents belief states by a special type of CNF formulae, called CNF-states. We de...
Son Thanh To, Tran Cao Son, Enrico Pontelli
ICDE
2007
IEEE
145views Database» more  ICDE 2007»
14 years 7 months ago
Fast Identification of Relational Constraint Violations
Logical constraints, (e.g., 'phone numbers in toronto can have prefixes 416, 647, 905 only'), are ubiquitous in relational databases. Traditional integrity constraints, ...
Amit Chandel, Nick Koudas, Ken Q. Pu, Divesh Sriva...
SENSYS
2009
ACM
14 years 17 days ago
Run time assurance of application-level requirements in wireless sensor networks
Continuous and reliable operation of WSNs is notoriously difficult to guarantee due to hardware degradation and environmental changes. In this paper, we propose and demonstrate a ...
Jingyuan Li, Yafeng Wu, Krasimira Kapitanova, John...
ICCAD
1999
IEEE
86views Hardware» more  ICCAD 1999»
13 years 10 months ago
Clock skew scheduling for improved reliability via quadratic programming
This paper considers the problem of determining an optimal clock skew schedule for a synchronous VLSI circuit. A novel formulation of clock skew scheduling as a constrained quadrat...
Ivan S. Kourtev, Eby G. Friedman