Sciweavers

1928 search results - page 185 / 386
» Integrity Constraints in OWL
Sort
View
114
Voted
SOCO
2005
Springer
15 years 6 months ago
Ad Hoc Composition of User Tasks in Pervasive Computing Environments
Due to the large success of wireless networks and portable devices, the pervasive computing paradigm is becoming a reality. One of the most challenging objectives to be achieved in...
Sonia Ben Mokhtar, Nikolaos Georgantas, Valé...
90
Voted
PATMOS
2004
Springer
15 years 6 months ago
An Efficient Low-Degree RMST Algorithm for VLSI/ULSI Physical Design
Motivated by very/ultra large scale integrated circuit (VLSI/ULSI) physical design applications, we study the construction of rectilinear minimum spanning tree (RMST) with its maxi...
Yin Wang, Xianlong Hong, Tong Jing, Yang Yang, Xia...
109
Voted
DSD
2003
IEEE
108views Hardware» more  DSD 2003»
15 years 6 months ago
Concurrent Operation Scheduling and Unit Allocation with an Evolutionary Technique
This paper presents a method with an evolutionary approach to some of the tasks of integrated-circuit (IC) design. The work is focused on application-specific integrated circuits ...
Gregor Papa, Jurij Silc
92
Voted
ICALP
2010
Springer
15 years 5 months ago
SDP Gaps for 2-to-1 and Other Label-Cover Variants
In this paper we present semidefinite programming (SDP) gap instances for the following variants of the Label-Cover problem, closely related to the Unique Games Conjecture: (i) 2-...
Venkatesan Guruswami, Subhash Khot, Ryan O'Donnell...
122
Voted
ICPR
2000
IEEE
15 years 5 months ago
Probabilistic Saliency Approach for Elongated Structure Detection Using Deformable Models
In this paper we address the object recognition problem in a probabilistic framework to detect and describe object appearance through image features organized by means of active c...
Xavier Orriols, Ricardo Toledo, Xavier Binefa, Pet...