Sciweavers

1719 search results - page 249 / 344
» Scheduling with soft constraints
Sort
View
SOFTWARE
2002
15 years 21 days ago
Software Engineering is Not Enough
Much of the software engineering literature begins with an admonition that what practitioners are doing isn't enough--that the state-of-the-practice is creating bad software. ...
James A. Whittaker, Steven Atkin
117
Voted
CVPR
2010
IEEE
15 years 9 months ago
Naming People from Dialog: Temporal Grouping and Weak Supervision
We address the character identification problem in movies and television videos: assigning names to faces on the screen. Most prior work on person recognition in video assumes s...
Timothee Cour, Benjamin Sapp, Akash Nagle, Ben Tas...
ICDE
2007
IEEE
193views Database» more  ICDE 2007»
16 years 2 months ago
Categorization and Optimization of Synchronization Dependencies in Business Processes
requirement. Furthermore, programming using sequence constructs normally produce nested structures and The current approachfor modeling synchronization in scattered code, especiall...
Qinyi Wu, Calton Pu, Akhil Sahai, Roger S. Barga
127
Voted
MOBIHOC
2010
ACM
14 years 11 months ago
Breaking bidder collusion in large-scale spectrum auctions
Dynamic spectrum auction is an effective solution to provide spectrum on-demand to many small wireless networks. As the number of participants grows, bidder collusion becomes a se...
Xia Zhou, Haitao Zheng
104
Voted
INFOCOM
2006
IEEE
15 years 7 months ago
Policy-Based Resource Management and Service Provisioning in GMPLS Networks
— Emerging network applications tend to be built over heterogeneous network resources spanning multiple management domains. Many such applications have dynamic demands for dedica...
Xi Yang, Tom Lehman, Chris Tracy, Jerry Sobieski, ...