Sciweavers

1920 search results - page 333 / 384
» The Range Constraint: Algorithms and Implementation
Sort
View
DAC
2006
ACM
15 years 1 months ago
Steiner network construction for timing critical nets
Conventionally, signal net routing is almost always implemented as Steiner trees. However, non-tree topology is often superior on timing performance as well as tolerance to open f...
Shiyan Hu, Qiuyang Li, Jiang Hu, Peng Li
ECAI
2006
Springer
15 years 1 months ago
A Multivalued Logic Model of Planning
Abstract. In this work a model for planning with multivalued fluents and graded actions, based on the infinite valued Lukasiewicz logic, is introduced. In multivalued planning, flu...
Marco Baioletti, Alfredo Milani, Valentina Poggion...
EDBTW
2006
Springer
15 years 1 months ago
Using Temporal Semantics for Live Media Stream Queries
Querying live media streams is a challenging problem that becomes an essential requirement in a growing number of applications. We address the problem of evaluating continuous quer...
Bin Liu, Amarnath Gupta, Ramesh Jain
VLDB
1991
ACM
81views Database» more  VLDB 1991»
15 years 1 months ago
On Maintaining Priorities in a Production Rule System
We present a priority system which is particularly suited for production rules coupled to databases. In this system, there are default priorities between all rules and overriding ...
Rakesh Agrawal, Roberta Cochrane, Bruce G. Lindsay
ICWS
2008
IEEE
14 years 11 months ago
A Theory of Role Composition
We study the access control integration problem for web services. Organizations frequently use many services, each with its own access control policies, that must interoperate whi...
Jeffrey Fischer, Rupak Majumdar