Sciweavers

2516 search results - page 375 / 504
» Integrity Constraints for XML
Sort
View
HEURISTICS
2006
197views more  HEURISTICS 2006»
14 years 10 months ago
Bucket elimination for multiobjective optimization problems
Multiobjective optimization deals with problems involving multiple measures of performance that should be optimized simultaneously. In this paper we extend bucket elimination (BE),...
Emma Rollon, Javier Larrosa
IJSEKE
2008
103views more  IJSEKE 2008»
14 years 10 months ago
A Modeling Methodology for Conflict Control in Multi-Agent Systems
- Multi-agent systems (MASs) have become an important topic in distributed systems research. These distributed multi-agent systems call for special software modeling methods that e...
Jiexin Lian, Sol M. Shatz
CORR
2007
Springer
111views Education» more  CORR 2007»
14 years 10 months ago
Influence of Memory Hierarchies on Predictability for Time Constrained Embedded Software
Safety-criticalembeddedsystems having to meet real-time constraints are to be highlypredictable in order to guarantee at design time that certain timing deadlines will always be m...
Lars Wehmeyer, Peter Marwedel
ENTCS
2007
108views more  ENTCS 2007»
14 years 10 months ago
Termination Criteria for DPO Transformations with Injective Matches
Reasoning about graph and model transformation systems is an important means to underpin model-driven software engineering, such as Model-Driven Architecture (MDA) and Model Integ...
Tihamer Levendovszky, Ulrike Prange, Hartmut Ehrig
SAC
2006
ACM
14 years 10 months ago
Editorial message: special track on ubiquitous computing
Ubiquitous computing places humans in the center of environments saturated with computing and wireless communications capabilities, yet gracefully integrated, so that technology r...
Achilles Kameas, George Roussos