Sciweavers

2488 search results - page 73 / 498
» Distributed Non-binary Constraints
Sort
View
ICDCS
2006
IEEE
15 years 6 months ago
Overlay Multicast with Inferred Link Capacity Correlations
We model the overlay using linear capacity constraints, which accurately and succinctly capture overlay link correlations. We show that finding a maximum-bandwidth multicast tree...
Ying Zhu, Baochun Li
HOTI
2008
IEEE
15 years 7 months ago
Constraint Repetition Inspection for Regular Expression on FPGA
— Recent network intrusion detection systems (NIDS) use regular expressions to represent suspicious or malicious character sequences in packet payloads in a more efficient way. ...
Miad Faezipour, Mehrdad Nourani
ATAL
2004
Springer
15 years 6 months ago
Towards a Formalization of Teamwork with Resource Constraints
Despite the recent advances in distributed MDP frameworks for reasoning about multiagent teams, these frameworks mostly do not reason about resource constraints, a crucial issue i...
Praveen Paruchuri, Milind Tambe, Fernando Ord&oacu...
125
Voted
ICRA
2003
IEEE
222views Robotics» more  ICRA 2003»
15 years 5 months ago
Path planning using learned constraints and preferences
— In this paper we present a novel method for robot path planning based on learning motion patterns. A motion pattern is defined as the path that results from applying a set of ...
Gregory Dudek, Saul Simhon
IEEEPACT
2002
IEEE
15 years 5 months ago
Eliminating Exception Constraints of Java Programs for IA-64
Java exception checks are designed to ensure that any faulting instruction causing a hardware exception does not terminate the program abnormally. These checks, however, impose so...
Kazuaki Ishizaki, Tatsushi Inagaki, Hideaki Komats...