Sciweavers

949 search results - page 104 / 190
» Theory of Constraints
Sort
View
103
Voted
ALP
1994
Springer
15 years 4 months ago
Compositional Analysis for Equational Horn Programs
Abstract. We introduce a compositional characterization of the operational semantics of equational Horn programs. Then we show that this semantics and the standard operational sema...
María Alpuente, Moreno Falaschi, Germ&aacut...
135
Voted
DBSEC
2009
163views Database» more  DBSEC 2009»
15 years 1 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
88
Voted
TALG
2010
110views more  TALG 2010»
14 years 11 months ago
Approximating fractional hypertree width
Fractional hypertree width is a hypergraph measure similar to tree width and hypertree width. Its algorithmic importance comes from the fact that, as shown in previous work [14], ...
Dániel Marx
102
Voted
ECTEL
2007
Springer
15 years 6 months ago
Reasoning-Based Curriculum Sequencing and Validation: Integration in a Service-Oriented Architecture
Abstract. We present a service-oriented personalization system, set in an educational framework, based on a semantic annotation of courses, given at a knowledge level (what the cou...
Matteo Baldoni, Cristina Baroglio, Ingo Brunkhorst...
CVPR
2007
IEEE
16 years 2 months ago
Using Geometry Invariants for Camera Response Function Estimation
In this paper, we present a new single-image camera response function (CRF) estimation method using geometry invariants (GI). We derive mathematical properties and geometric inter...
Tian-Tsong Ng, Shih-Fu Chang, Mao-Pei Tsui