Sciweavers

1662 search results - page 151 / 333
» Privately Finding Specifications
Sort
View
AND
2009
15 years 1 months ago
Kernel-based relation extraction from investigative data
In a specific process of business intelligence, i.e. investigation on organized crime, empirical language processing technologies can play a crucial role. In the data used on inve...
Cristina Giannone, Roberto Basili, Chiara Del Vesc...
155
Voted
CDC
2010
IEEE
122views Control Systems» more  CDC 2010»
14 years 10 months ago
On optimal input design in system identification for control
Abstract-- This paper considers a recently proposed framework for experiment design in system identification for control. We will consider model based control design methods, such ...
Bo Wahlberg, Håkan Hjalmarsson, Mariette Ann...
148
Voted
EJWCN
2010
119views more  EJWCN 2010»
14 years 10 months ago
Simulations of the Impact of Controlled Mobility for Routing Protocols
This paper addresses mobility control routing in wireless networks. Given a data flow request between a sourcedestination pair, the problem is to move nodes towards the best placem...
Valeria Loscrì, Enrico Natalizio, Carmelo C...
155
Voted
JSAT
2010
132views more  JSAT 2010»
14 years 10 months ago
The Impact of Max-SAT Resolution-Based Preprocessors on Local Search Solvers
In this paper we analyze three well-known preprocessors for Max-SAT. The first preprocessor is based on the so-called variable saturation. The second preprocessor is based on the ...
Federico Heras, David Bañeres
138
Voted
IJCAI
1989
15 years 4 months ago
Functional Representation of Designs and Redesign Problem Solving
gn problem can be abstractly characterized as a constrained function-to-structure mapping. The de­ sign task takes as input the specifications of the desired functions of a device...
Ashok K. Goel, B. Chandrasekaran