Sciweavers

4081 search results - page 150 / 817
» The Impact of Constraint Programming
Sort
View
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
15 years 10 months ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
CORR
2002
Springer
81views Education» more  CORR 2002»
15 years 4 months ago
Value withdrawal explanations: a theoretical tool for programming environments
Abstract. Constraint logic programming combines declarativity and efficiency thanks to constraint solvers implemented for specific domains. Value withdrawal explanations have been ...
Willy Lesaint
ACL
2009
15 years 2 months ago
Concise Integer Linear Programming Formulations for Dependency Parsing
We formulate the problem of nonprojective dependency parsing as a polynomial-sized integer linear program. Our formulation is able to handle non-local output features in an effici...
André L. Martins, Noah A. Smith, Eric P. Xi...
149
Voted
GLOBECOM
2007
IEEE
15 years 6 months ago
A Cross-Layer Proportional Fair Scheduling Algorithm with Packet Length Constraint in Multiuser OFDM Networks
— 1 In this paper, we investigate the proportional fair scheduling (PFS) problem for multiuser OFDM systems, considering the impact of packet length. Packet length influences sc...
Jinri Huang, Zhisheng Niu
156
Voted
ICCV
2003
IEEE
16 years 6 months ago
Scene Modeling Based on Constraint System Decomposition Techniques
We present a new approach to 3D scene modeling based on geometric constraints. Contrary to the existing methods, we can quickly obtain 3D scene models that respect the given const...
Marta Wilczkowiak, Gilles Trombettoni, Christophe ...