Sciweavers

102291 search results - page 20052 / 20459
» Computing
Sort
View
AES
2007
Springer
75views Cryptology» more  AES 2007»
15 years 3 months ago
Improved FVM for two-layer shallow-water models: Application to the Strait of Gibraltar
This paper deals with the numerical simulation of flows of stratified fluids through channels with irregular geometry. Channel crosssections are supposed to be symmetric but no...
Manuel Jose Castro Díaz, José A. Gar...
133
Voted
AI
2010
Springer
15 years 3 months ago
Automatically generating personalized user interfaces with Supple
Today's computer-human interfaces are typically designed with the assumption that they are going to be used by an able-bodied person, who is using a typical set of input and ...
Krzysztof Z. Gajos, Daniel S. Weld, Jacob O. Wobbr...
122
Voted
AI
2010
Springer
15 years 3 months ago
Implementing logical connectives in constraint programming
Combining constraints using logical connectives such as disjunction is ubiquitous in constraint programming, because it adds considerable expressive power to a constraint language...
Christopher Jefferson, Neil C. A. Moore, Peter Nig...
AI
2008
Springer
15 years 3 months ago
An approach to efficient planning with numerical fluents and multi-criteria plan quality
Dealing with numerical information is practically important in many real-world planning domains where the executability of an action can depend on certain numerical conditions, an...
Alfonso Gerevini, Alessandro Saetti, Ivan Serina
135
Voted
AI
2008
Springer
15 years 3 months ago
Modelling and solving temporal reasoning as propositional satisfiability
Representing and reasoning about time dependent information is a key research issue in many areas of computer science and artificial intelligence. One of the best known and widely...
Duc Nghia Pham, John Thornton, Abdul Sattar
« Prev « First page 20052 / 20459 Last » Next »