Sciweavers

6554 search results - page 1083 / 1311
» Constraint Logic Programming
Sort
View
TVLSI
2010
14 years 11 months ago
Discrete Buffer and Wire Sizing for Link-Based Non-Tree Clock Networks
Clock network is a vulnerable victim of variations as well as a main power consumer in many integrated circuits. Recently, link-based non-tree clock network attracts people's...
Rupak Samanta, Jiang Hu, Peng Li
ICDT
2012
ACM
247views Database» more  ICDT 2012»
13 years 6 months ago
A normal form for preventing redundant tuples in relational databases
We introduce a new normal form, called essential tuple normal form (ETNF), for relations in a relational database where the constraints are given by functional dependencies and jo...
Hugh Darwen, C. J. Date, Ronald Fagin

Publication
518views
17 years 3 months ago
Procurement of Global Logistics Services Using Combinatorial Auction
Global logistics flows have increased dramatically in recent years due to the globalization in the world economy. It is more complex than the domestic logistics, consisting of mult...
Nikesh Kumar Srivastava, N. Viswanadham, and S. Ka...
ICIP
2008
IEEE
16 years 6 months ago
Face hallucination VIA sparse coding
In this paper, we address the problem of hallucinating a high resolution face given a low resolution input face. The problem is approached through sparse coding. To exploit the fa...
Jianchao Yang, Hao Tang, Yi Ma, Thomas S. Huang
ICIP
2004
IEEE
16 years 6 months ago
Optimal object-based video communications over differentiated services networks
In this paper, we propose an optimal unequal error protection scheme for object-based video communications over differentiated services networks. Our goal is to achieve the best v...
Haohong Wang, Fan Zhai, Yiftach Eisenberg, Aggelos...
« Prev « First page 1083 / 1311 Last » Next »