Sciweavers

661 search results - page 37 / 133
» Combining Information using Hard Constraints
Sort
View
VLDB
2005
ACM
136views Database» more  VLDB 2005»
15 years 3 months ago
iMeMex: Escapes from the Personal Information Jungle
Modern computer work stations provide thousands of applications that store data in >100.000 files on the file system of the underlying OS. To handle these files data process...
Jens-Peter Dittrich, Marcos Antonio Vaz Salles, Do...
75
Voted
ANOR
2002
100views more  ANOR 2002»
14 years 10 months ago
A Limited-Memory Multipoint Symmetric Secant Method for Bound Constrained Optimization
A new algorithm for solving smooth large-scale minimization problems with bound constraints is introduced. The way of dealing with active constraints is similar to the one used in...
Oleg P. Burdakov, José Mario Martíne...
CHI
2007
ACM
15 years 10 months ago
A cognitive constraint model of dual-task trade-offs in a highly dynamic driving task
The paper describes an approach to modeling the strategic variations in performing secondary tasks while driving. In contrast to previous efforts that are based on simulation of a...
Duncan P. Brumby, Andrew Howes, Dario D. Salvucci
ECCV
2010
Springer
15 years 2 months ago
Geometric Constraints for Human Detection in Aerial Imagery
In this paper, we propose a method for detecting humans in imagery taken from a UAV. This is a challenging problem due to small number of pixels on target, which makes it more di...
CAV
2009
Springer
116views Hardware» more  CAV 2009»
15 years 2 months ago
Priority Scheduling of Distributed Systems Based on Model Checking
Priorities are used to control the execution of systems to meet given requirements for optimal use of resources, e.g., by using scheduling policies. For distributed systems, it is ...
Ananda Basu, Saddek Bensalem, Doron Peled, Joseph ...