Sciweavers

5 search results - page 1 / 1
» Toward a Generalization of Rough Sets Based on Active and Pa...
Sort
View
JACIII
2006
44views more  JACIII 2006»
14 years 10 months ago
Toward a Generalization of Rough Sets Based on Active and Passive Relations
Masashi Emoto, Rolly Intan, Masao Mukaidono
DATE
2009
IEEE
123views Hardware» more  DATE 2009»
15 years 5 months ago
On decomposing Boolean functions via extended cofactoring
—We investigate restructuring techniques based on decomposition/factorization, with the objective to move critical signals toward the output while minimizing area. A specific ap...
Anna Bernasconi, Valentina Ciriani, Gabriella Truc...
98
Voted
GRC
2008
IEEE
14 years 11 months ago
Scalar-product based Secure Two-party Computation
—Secure multiparty computation is a very important research topic in cryptography. A secure multi-party computation involves N untrusful parties. It takes input xi from the ith p...
Chih-Hao Shen, Justin Zhan, Tsan-sheng Hsu, Churn-...
83
Voted
HEURISTICS
2002
152views more  HEURISTICS 2002»
14 years 10 months ago
A Constraint-Based Method for Project Scheduling with Time Windows
This paper presents a heuristic algorithm for solving RCPSP/max, the resource constrained project scheduling problem with generalized precedence relations. The algorithm relies, a...
Amedeo Cesta, Angelo Oddi, Stephen F. Smith
87
Voted
MOBICOM
2010
ACM
14 years 10 months ago
Inferring and mitigating a link's hindering transmissions in managed 802.11 wireless networks
In 802.11 managed wireless networks, the manager can address under-served links by rate-limiting the conflicting nodes. In order to determine to what extent each conflicting node ...
Eugenio Magistretti, Omer Gurewitz, Edward W. Knig...