Sciweavers

803 search results - page 53 / 161
» Multiply-constrained distributed constraint optimization
Sort
View
ICDT
1995
ACM
79views Database» more  ICDT 1995»
15 years 6 months ago
Optimization Using Tuple Subsumption
A tuple t1 of relation R subsumes tuple t2 of R, with respect to a query Q if for every database, tuple t1 derives all, and possibly more, answers to query Q than derived by tuple ...
Venky Harinarayan, Ashish Gupta
TII
2008
169views more  TII 2008»
15 years 3 months ago
Fine-Tuning MAC-Level Protocols for Optimized Real-Time QoS
In distributed real-time systems, meeting the real-time constraints is mandatory but the satisfaction of other application-dependent criteria is most generally required as well. I...
Mathieu Grenier, Nicolas Navet
ICCD
2008
IEEE
420views Hardware» more  ICCD 2008»
16 years 5 days ago
Frequency and voltage planning for multi-core processors under thermal constraints
— Clock frequency and transistor density increases have resulted in elevated chip temperatures. In order to meet temperature constraints while still exploiting the performance op...
Michael Kadin, Sherief Reda
ICC
2008
IEEE
171views Communications» more  ICC 2008»
15 years 9 months ago
On the Capacity of Training-Based Transmissions with Input Peak Power Constraints
— 1 In this paper, training-based transmissions over a priori unknown Rayleigh block fading channels are considered. The input signals are assumed to be subject to peak power con...
Mustafa Cenk Gursoy
113
Voted
HOTI
2008
IEEE
15 years 9 months ago
Constraint Repetition Inspection for Regular Expression on FPGA
— Recent network intrusion detection systems (NIDS) use regular expressions to represent suspicious or malicious character sequences in packet payloads in a more efficient way. ...
Miad Faezipour, Mehrdad Nourani