Sciweavers

3758 search results - page 201 / 752
» A Complete Subsumption Algorithm
Sort
View
152
Voted
ICDT
2012
ACM
251views Database» more  ICDT 2012»
13 years 4 months ago
Computing universal models under guarded TGDs
A universal model of a database D and a set Σ of integrity constraints is a database that extends D, satisfies Σ, and is most general in the sense that it contains sound and co...
André Hernich
126
Voted
TIME
2009
IEEE
15 years 9 months ago
Fixing the Semantics for Dynamic Controllability and Providing a More Practical Characterization of Dynamic Execution Strategies
Morris, Muscettola and Vidal (MMV) presented an algorithm for checking the dynamic controllability (DC) of temporal networks in which certain temporal durations are beyond the con...
Luke Hunsberger
127
Voted
PPSN
2004
Springer
15 years 7 months ago
Evolution of Voronoi-Based Fuzzy Controllers
A fuzzy controller is usually designed by formulating the knowledge of a human expert into a set of linguistic variables and fuzzy rules. One of the most successful methods to auto...
Carlos Kavka, Marc Schoenauer
OOPSLA
1999
Springer
15 years 6 months ago
Compositional Pointer and Escape Analysis for Java Programs
This paper presents a combined pointer and escape analysis algorithm for Java programs. The algorithm is based on the abstraction of points-to escape graphs, which characterize ho...
John Whaley, Martin C. Rinard
RTSS
1992
IEEE
15 years 6 months ago
Scheduling Sporadic Tasks with Shared Resources in Hard-Real-Time Systems
The problem of scheduling a set of sporadic tasks that share a set of serially reusable, single unit software resources on a single processor is considered. The correctness condit...
Kevin Jeffay