Sciweavers

5344 search results - page 273 / 1069
» Privacy-Preserving Set Operations
Sort
View
DEON
2004
Springer
15 years 7 months ago
Conflicting Imperatives and Dyadic Deontic Logic
Often a set of imperatives or norms seems satisfiable from the outset, but conflicts arise when ways to fulfill all are ruled out by unfortunate circumstances. Semantic methods to ...
Jörg Hansen
CPAIOR
2006
Springer
15 years 7 months ago
Allocation, Scheduling and Voltage Scaling on Energy Aware MPSoCs
Abstract. In this paper we introduce a complex allocation and scheduling problem for variable voltage Multi-Processor System-on-Chip (MPSoC) platforms. We propose a methodology to ...
Luca Benini, Davide Bertozzi, Alessio Guerri, Mich...
129
Voted
CPAIOR
2006
Springer
15 years 7 months ago
The Range Constraint: Algorithms and Implementation
Abstract. We recently proposed a simple declarative language for specifying a wide range of counting and occurrence constraints. The language uses just two global primitives: the R...
Christian Bessière, Emmanuel Hebrard, Brahi...
VLDB
1995
ACM
132views Database» more  VLDB 1995»
15 years 7 months ago
Coloring Away Communication in Parallel Query Optimization
We address the problem of finding parallel plans for SQL queries using the two-phase approach of join ordering and query rewrite (JOQR) followed by parallelization. We focus on t...
Waqar Hasan, Rajeev Motwani
CPAIOR
2010
Springer
15 years 7 months ago
Automated Configuration of Mixed Integer Programming Solvers
Abstract. State-of-the-art solvers for mixed integer programming (MIP) problems are highly parameterized, and finding parameter settings that achieve high performance for specific ...
Frank Hutter, Holger H. Hoos, Kevin Leyton-Brown