Sciweavers

2516 search results - page 394 / 504
» Integrity Constraints for XML
Sort
View
DAGSTUHL
2006
14 years 11 months ago
Cognitive Vision Needs Attention to Link Sensing with Recognition
Abstract. "Cognitive computer vision is concerned with integration and control of vision systems using explicit but not necessarily symbolic models of context, situation and g...
John K. Tsotsos
FIW
1998
130views Communications» more  FIW 1998»
14 years 11 months ago
A Heuristic Approach to Detect Feature Interactions in Requirements
We present a method to systematically detect feature interactions in requirements, which are expressed as constraints on system event traces. We show its application on the lift sy...
Maritta Heisel, Jeanine Souquières
JSAC
2007
140views more  JSAC 2007»
14 years 9 months ago
Cross-layer resource allocation over wireless relay networks for quality of service provisioning
— We propose a physical-datalink cross-layer resource allocation scheme over wireless relay networks for quality-ofservice (QoS) guarantees. By integrating information theory wit...
Jia Tang, Xi Zhang
TACAS
2010
Springer
255views Algorithms» more  TACAS 2010»
14 years 7 months ago
Satisfiability Modulo the Theory of Costs: Foundations and Applications
Abstract. We extend the setting of Satisfiability Modulo Theories (SMT) by introducing a theory of costs C, where it is possible to model and reason about resource consumption and ...
Alessandro Cimatti, Anders Franzén, Alberto...
IJKDB
2010
170views more  IJKDB 2010»
14 years 7 months ago
Clustering Genes Using Heterogeneous Data Sources
Clustering of gene expression data is a standard exploratory technique used to identify closely related genes. Many other sources of data are also likely to be of great assistance...
Erliang Zeng, Chengyong Yang, Tao Li, Giri Narasim...