Sciweavers

6554 search results - page 1049 / 1311
» Constraint Logic Programming
Sort
View
145
Voted
ANOR
2004
116views more  ANOR 2004»
15 years 4 months ago
Approximations and Randomization to Boost CSP Techniques
Abstract. In recent years we have seen an increasing interest in combining constraint satisfaction problem (CSP) formulations and linear programming (LP) based techniques for solvi...
Carla P. Gomes, David B. Shmoys
123
Voted
MOR
2002
102views more  MOR 2002»
15 years 4 months ago
Facets of the Complementarity Knapsack Polytope
We present a polyhedral study of the complementarity knapsack problem. Traditionally, complementarity constraints are modeled by introducing auxiliary binary variables and additio...
Ismael R. de Farias Jr., Ellis L. Johnson, George ...
JOT
2010
114views more  JOT 2010»
15 years 3 months ago
Semantic Annotation for Java
This paper describes how to use annotation to provide semantic information. The applications include the automatic construction of a GUI so that the user input is constrained to a...
Douglas Lyon
PSD
2010
Springer
109views Database» more  PSD 2010»
15 years 3 months ago
A Tool for Analyzing and Fixing Infeasible RCTA Instances
Minimum-distance controlled tabular adjustment methods (CTA), and its restricted variants (RCTA), is a recent perturbative approach for tabular data protection. Given a table to be...
Jordi Castro, José A. González
133
Voted
TASLP
2010
98views more  TASLP 2010»
15 years 3 months ago
Trellis-Based Approaches to Rate-Distortion Optimized Audio Encoding
—Many important audio coding applications, such as streaming and playback of stored audio, involve offline compression. In such scenarios, encoding delays no longer represent a ...
Vinay Melkote, Kenneth Rose
« Prev « First page 1049 / 1311 Last » Next »