Sciweavers

325 search results - page 51 / 65
» Analysis of the constraint proposal method for two-party neg...
Sort
View
CIKM
2004
Springer
15 years 5 months ago
Processing content-oriented XPath queries
Document-centric XML collections contain text-rich documents, marked up with XML tags that add lightweight semantics to the text. Querying such collections calls for a hybrid quer...
Börkur Sigurbjörnsson, Jaap Kamps, Maart...
110
Voted
GECCO
2006
Springer
162views Optimization» more  GECCO 2006»
15 years 4 months ago
Improving evolutionary real-time testing
Embedded systems are often used in a safety-critical context, e.g. in airborne or vehicle systems. Typically, timing constraints must be satisfied so that real-time embedded syste...
Marouane Tlili, Stefan Wappler, Harmen Sthamer
100
Voted
GLOBECOM
2007
IEEE
15 years 6 months ago
Robust Optimization for Selecting NetFlow Points of Measurement in an IP Network
— NetFlow is a solution to make an in-depth traffic analysis possible in IP networks. Most of the telecommunication operators have already deployed it, or intend to do so, for n...
Mustapha Bouhtou, Olivier Klopfenstein
123
Voted
ECCV
2002
Springer
16 years 2 months ago
Diffuse-Specular Separation and Depth Recovery from Image Sequences
Specular reflections present difficulties for many areas of computer vision such as stereo and segmentation. To separate specular and diffuse reflection components, previous approa...
Stephen Lin, Yuanzhen Li, Sing Bing Kang, Xin Tong...
106
Voted
ICCD
2006
IEEE
137views Hardware» more  ICCD 2006»
15 years 9 months ago
Reduction of Crosstalk Pessimism using Tendency Graph Approach
— Accurate estimation of worst-case crosstalk effects is critical for a realistic estimation of the worst-case behavior of deep sub-micron circuits. Crosstalk analysis models usu...
Murthy Palla, Klaus Koch, Jens Bargfrede, Manfred ...