Sciweavers

8655 search results - page 1286 / 1731
» Challenges for Trusted Computing
Sort
View
SARA
2009
Springer
15 years 11 months ago
Common Subexpressions in Constraint Models of Planning Problems
Constraint Programming is an attractive approach for solving AI planning problems by modelling them as Constraint Satisfaction Problems (CSPs). However, formulating effective cons...
Andrea Rendl, Ian Miguel, Ian P. Gent, Peter Grego...
SCIA
2009
Springer
125views Image Analysis» more  SCIA 2009»
15 years 11 months ago
Recognition of Protruding Objects in Highly Structured Surroundings by Structural Inference
Recognition of objects in highly structured surroundings is a challenging task, because the appearance of target objects changes due to fluctuations in their surroundings. This ma...
Vincent Frans van Ravesteijn, Frans M. Vos, Lucas ...
ASPDAC
2009
ACM
161views Hardware» more  ASPDAC 2009»
15 years 11 months ago
Risk aversion min-period retiming under process variations
— Recent advances in statistical timing analysis (SSTA) achieve great success in computing arrival times under variations by extending sum and maximum operations to random variab...
Jia Wang, Hai Zhou
KCAP
2009
ACM
15 years 11 months ago
Workflow matching using semantic metadata
Workflows are becoming an increasingly more common paradigm to manage scientific analyses. As workflow repositories start to emerge, workflow retrieval and discovery becomes a cha...
Yolanda Gil, Jihie Kim, Gonzalo Flórez Puga...
MM
2009
ACM
159views Multimedia» more  MM 2009»
15 years 11 months ago
Visual categorization with negative examples for free
Automatic visual categorization is critically dependent on labeled examples for supervised learning. As an alternative to traditional expert labeling, social-tagged multimedia is ...
Xirong Li, Cees G. M. Snoek
« Prev « First page 1286 / 1731 Last » Next »