Sciweavers

2150 search results - page 82 / 430
» On a restricted cross-intersection problem
Sort
View
KR
2010
Springer
15 years 9 months ago
Pushing the Limits of Reasoning over Ontologies with Hidden Content
There is currently a growing interest in techniques for hiding parts of the signature of an ontology Kh that is being reused by another ontology Kv. Towards this goal, Cuenca Grau...
Bernardo Cuenca Grau, Boris Motik
CLUSTER
2000
IEEE
15 years 9 months ago
Distributed Processor Allocation in Multicomputers
Current processor allocation techniques for multicomputers are based on centralized front-end based algorithms. As a result, the applied strategies are usually restricted to stati...
Rose Rose, Hans-Ulrich Heiss, Philippe Olivier Ale...
COCOON
2008
Springer
15 years 6 months ago
Damaged BZip Files Are Difficult to Repair
bzip is a program written by Julian Seward that is often used under Unix to compress single files. It splits the file into blocks which are compressed individually using a combinat...
Christian Hundt, Ulf Ochsenfahrt
WSC
2004
15 years 5 months ago
A Generalized Multiple Response Surface Methodology for Complex Computer Simulation Applications
This work provides a generalization of the traditional response surface methodology (RSM) that can be applied to complex, multi-objective simulation studies. These problems involv...
Jeffrey B. Schamburg, Donald E. Brown
AAAI
1998
15 years 5 months ago
Control Strategies in HTN Planning: Theory Versus Practice
AI planning techniques are beginning to find use in a number of practical planning domains. However, the backward-chaining and partial-order-planning control strategies traditiona...
Dana S. Nau, Stephen J. J. Smith, Kutluhan Erol