Sciweavers

5624 search results - page 909 / 1125
» On Conditional Covering Problem
Sort
View
146
Voted
ACL2
2006
ACM
15 years 8 months ago
Parameterized congruences in ACL2
Support for congruence-based rewriting is built into ACL2. This capability allows ACL2 to treat certain predicate relations ”just like equality” under appropriate conditions a...
David Greve
122
Voted
ACMICEC
2006
ACM
152views ECommerce» more  ACMICEC 2006»
15 years 8 months ago
Capacity allocation with competitive retailers
This paper addresses a problem in supply chain management that how scarce resources can be efficiently allocated among competing interests. We present a formal model of allocation...
Masabumi Furuhata, Dongmo Zhang
99
Voted
ASPDAC
2006
ACM
119views Hardware» more  ASPDAC 2006»
15 years 8 months ago
Using speculative computation and parallelizing techniques to improve scheduling of control based designs
Recent research results have seen the application of parallelizing techniques to high-level synthesis. In particular, the effect of speculative code transformations on mixed contr...
Roberto Cordone, Fabrizio Ferrandi, Marco D. Santa...
155
Voted
MINENET
2006
ACM
15 years 8 months ago
Diagnosis of TCP overlay connection failures using bayesian networks
When failures occur in Internet overlay connections today, it is difficult for users to determine the root cause of failure. An overlay connection may require TCP connections bet...
George J. Lee, Lindsey Poole
123
Voted
MMSEC
2006
ACM
167views Multimedia» more  MMSEC 2006»
15 years 8 months ago
Hermite polynomials as provably good functions to watermark white gaussian hosts
In the watermark detection scenario, also known as zero-bit watermarking, a watermark, carrying no hidden message, is inserted in content. The watermark detector checks for the pr...
Teddy Furon