Sciweavers

2109 search results - page 316 / 422
» Solving Necklace Constraint Problems
Sort
View
IFIP
2007
Springer
15 years 10 months ago
A Framework for QoS Contract Negotiation in Component-Based Applications
The support of QoS properties in component-based software requires the run-time selection of appropriate concrete QoS contracts at the ports of the interacting components. Such a s...
Mesfin Mulugeta, Alexander Schill
INFOCOM
2005
IEEE
15 years 10 months ago
Energy optimal control for time varying wireless networks
Abstract— We develop a dynamic control strategy for minimizing energy expenditure in a time varying wireless network with adaptive transmission rates. The algorithm operates with...
Michael J. Neely
AIED
2005
Springer
15 years 10 months ago
The Effect of Explaining on Learning: a Case Study with a Data Normalization Tutor
: Several studies have shown that explaining actions increases students’ knowledge. In this paper, we discuss how NORMIT supports self-explanation. NORMIT is a constraint-based t...
Antonija Mitrovic
CP
2005
Springer
15 years 10 months ago
Tree Decomposition with Function Filtering
Besides search, complete inference methods can also be used to solve soft constraint problems. Their main drawback is the high spatial complexity. To improve its practical usage, w...
Martí Sánchez, Javier Larrosa, Pedro...
ICDT
2005
ACM
117views Database» more  ICDT 2005»
15 years 10 months ago
Privacy in Database Publishing
We formulate and study a privacy guarantee to data owners, who share information with clients by publishing views of a proprietary database. The owner identifies the sensitive pro...
Alin Deutsch, Yannis Papakonstantinou