Sciweavers

2845 search results - page 310 / 569
» Constraints over Ontologies
Sort
View
108
Voted
DATE
2005
IEEE
171views Hardware» more  DATE 2005»
15 years 6 months ago
Access Pattern-Based Code Compression for Memory-Constrained Embedded Systems
As compared to a large spectrum of performance optimizations, relatively little effort has been dedicated to optimize other aspects of embedded applications such as memory space r...
Ozcan Ozturk, Hendra Saputra, Mahmut T. Kandemir, ...
ICIP
2005
IEEE
15 years 6 months ago
Complexity-aware live streaming system
Multimedia streaming is one of the most attractive services over the Internet, for which bandwidth is a primary constraint. For live streaming, however, the computational resource ...
Meng-Ting Lu, Chang-Kuan Lin, Jason Yao, Homer H. ...
ICNP
2005
IEEE
15 years 6 months ago
Exploiting Dynamic Querying like Flooding Techniques in Unstructured Peer-to-Peer Networks
In unstructured peer-to-peer networks, controlled flooding aims at locating an item at the minimum message cost. Dynamic querying is a new controlled flooding technique. While i...
Hongbo Jiang, Shudong Jin
79
Voted
ATAL
2005
Springer
15 years 6 months ago
Tunably decentralized algorithms for cooperative target observation
Multi-agent problem domains may require distributed algorithms for a variety of reasons: local sensors, limitations of communication, and availability of distributed computational...
Sean Luke, Keith Sullivan, Liviu Panait, Gabriel C...
LPAR
2005
Springer
15 years 6 months ago
Deciding Separation Logic Formulae by SAT and Incremental Negative Cycle Elimination
Separation logic is a subset of the quantifier-free first order logic. It has been successfully used in the automated verification of systems that have large (or unbounded) inte...
Chao Wang, Franjo Ivancic, Malay K. Ganai, Aarti G...