Sciweavers

2398 search results - page 101 / 480
» Constraint Programming and Graph Algorithms
Sort
View
HASE
2008
IEEE
15 years 11 months ago
A Grammar-Based Reverse Engineering Framework for Behavior Verification
A high assurance system requires both functional and nonfunctional correctness before the system is put into operation. To examine whether a system’s actual performance complies...
Chunying Zhao, Kang Zhang
161
Voted
IWMMDBMS
1996
88views more  IWMMDBMS 1996»
15 years 6 months ago
Automating the Organization of Presentations for Playout Management in Multimedia Databases
We introduce a constraint-driven methodology for the automated assembly, organization and playout of presentations from multimedia databases. We use inclusion and exclusion constr...
Veli Hakkoymaz, Gultekin Özsoyoglu
150
Voted
TAPSOFT
1997
Springer
15 years 9 months ago
Inclusion Constraints over Non-empty Sets of Trees
Abstract. We present a new constraint system called INES. Its constraints are conjunctions of inclusions t1 t2 between rst-order terms (without set operators) which are interpreted...
Martin Müller, Joachim Niehren, Andreas Podel...
CPAIOR
2005
Springer
15 years 10 months ago
Scheduling Social Golfers Locally
The scheduling of social golfers has attracted significant attention in recent years because of its highly symmetrical and combinatorial nature. In particular, it has become one o...
Iván Dotú, Pascal Van Hentenryck
145
Voted
IFIP
2004
Springer
15 years 10 months ago
Engineering an External Memory Minimum Spanning Tree Algorithm
We develop an external memory algorithm for computing minimum spanning trees. The algorithm is considerably simpler than previously known external memory algorithms for this proble...
Roman Dementiev, Peter Sanders, Dominik Schultes, ...