Sciweavers

2421 search results - page 179 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
119
Voted
ICDAR
2003
IEEE
15 years 8 months ago
A Constraint-based Approach to Table Structure Derivation
er presents an approach to deriving an abstract geometric model of a table from a physical representation. The technique developed uses a graph of constraints between cells which ...
Matthew Hurst
125
Voted
CCR
2000
96views more  CCR 2000»
15 years 3 months ago
Decentralized optimal traffic engineering in the internet
Distributed optimal traffic engineering in the presence of multiple paths has been found to be a difficult problem to solve. In this paper, we introduce a new approach in an attem...
Constantino M. Lagoa, Hao Che
BMCBI
2002
133views more  BMCBI 2002»
15 years 3 months ago
Identification and characterization of subfamily-specific signatures in a large protein superfamily by a hidden Markov model app
Background: Most profile and motif databases strive to classify protein sequences into a broad spectrum of protein families. The next step of such database studies should include ...
Kevin Truong, Mitsuhiko Ikura
ECIS
2001
15 years 5 months ago
Whatever Happened to the IT Plan?
The IT Plan is generally seen as a cornerstone of the IS/IT presence in an organisation. Researchers have outlined various approaches to IT planning and many have suggested catego...
Philip J. Dobson, Craig Standing
158
Voted
JSAT
2006
134views more  JSAT 2006»
15 years 3 months ago
Pueblo: A Hybrid Pseudo-Boolean SAT Solver
This paper introduces a new hybrid method for efficiently integrating Pseudo-Boolean (PB) constraints into generic SAT solvers in order to solve PB satisfiability and optimization...
Hossein M. Sheini, Karem A. Sakallah