Sciweavers

933 search results - page 85 / 187
» Extending Forward Checking
Sort
View
95
Voted
IJCAI
1997
15 years 2 months ago
Reifying Concepts in Description Logics
Practical applications of description logics (DLs) in knowledge-based systems have forced us to introduce the following features which are absent from existing DLs: • allowing a...
Liviu Badea
118
Voted
AAAI
1996
15 years 2 months ago
Enhancements of Branch and Bound Methods for the Maximal Constraint Satisfaction Problem
Two methods are described for enhancing performance of branch and bound methods for overconstrained CSPS. These methods improve either the upper or lower bound, respectively, duri...
Richard J. Wallace
96
Voted
ENTCS
2007
143views more  ENTCS 2007»
15 years 22 days ago
Formal Fault Tree Analysis - Practical Experiences
Safety is an important requirement for many modern systems. To ensure safety of complex critical systems, well-known safety analysis methods have been formalized. This holds in pa...
Frank Ortmeier, Gerhard Schellhorn
109
Voted
JSAC
2011
108views more  JSAC 2011»
14 years 7 months ago
A Model-Based Approach to Cognitive Radio Design
Abstract—Cognitive radio is a promising technology for fulfilling the spectrum and service requirements of future wireless communication systems. Real experimentation is a key f...
Jorg Lotze, Suhaib A. Fahmy, Juanjo Noguera, Linda...
108
Voted
WINET
2010
137views more  WINET 2010»
14 years 7 months ago
The design and evaluation of interleaved authentication for filtering false reports in multipath routing WSNs
In this paper, we consider filtering false reports in braided multipath routing sensor networks. While multipath routing provides better resilience to various faults in sensor net...
Youtao Zhang, Jun Yang 0002, Hai T. Vu, Yizhi Wu