Sciweavers

10907 search results - page 2137 / 2182
» Constraint Based Strategies
Sort
View
SIGMOD
2010
ACM
211views Database» more  SIGMOD 2010»
15 years 2 months ago
ERACER: a database approach for statistical inference and data cleaning
Real-world databases often contain syntactic and semantic errors, in spite of integrity constraints and other safety measures incorporated into modern DBMSs. We present ERACER, an...
Chris Mayfield, Jennifer Neville, Sunil Prabhakar
ECMDAFA
2010
Springer
238views Hardware» more  ECMDAFA 2010»
15 years 2 months ago
eSPEM - A SPEM Extension for Enactable Behavior Modeling
OMG’s SPEM – by means of its (semi-)formal notation – allows for a detailed description of development processes and methodologies, but can only be used for a rather coarse d...
Ralf Ellner, Samir Al-Hilank, Johannes Drexler, Ma...
MPC
2010
Springer
152views Mathematics» more  MPC 2010»
15 years 2 months ago
Lucy-n: a n-Synchronous Extension of Lustre
Synchronous functional languages such as Lustre or Lucid Synchrone define a restricted class of Kahn Process Networks which can be executed with no buffer. Every expression is as...
Louis Mandel, Florence Plateau, Marc Pouzet
SAC
2009
ACM
15 years 2 months ago
Impact of function inlining on resource-constrained embedded systems
With the development of computer systems, function inlining schemes were used to reduce execution time while increasing codes. In embedded systems such as wireless sensor nodes, t...
Bongjae Kim, Sangho Yi, Yookun Cho, Jiman Hong
AGENTS
2001
Springer
15 years 2 months ago
Adjustable autonomy in real-world multi-agent environments
Through adjustable autonomy (AA), an agent can dynamically vary the degree to which it acts autonomously, allowing it to exploit human abilities to improve its performance, but wi...
Paul Scerri, David V. Pynadath, Milind Tambe
« Prev « First page 2137 / 2182 Last » Next »