Sciweavers

2821 search results - page 483 / 565
» Tracing a single user
Sort
View
MP
2006
119views more  MP 2006»
14 years 12 months ago
Approximate extended formulations
Mixed integer programming (MIP) formulations are typically tightened through the use of a separation algorithm and the addition of violated cuts. Using extended formulations involv...
Mathieu Van Vyve, Laurence A. Wolsey
NGC
2006
Springer
14 years 12 months ago
Story Planning as Exploratory Creativity: Techniques for Expanding the Narrative Search Space
The authoring of fictional stories is considered a creative process. The purpose of most story authoring is not to invent a new style or genre of story that will be accepted by the...
Mark O. Riedl, R. Michael Young
RAS
2006
100views more  RAS 2006»
14 years 11 months ago
Sampling and node adding in probabilistic roadmap planners
The probabilistic roadmap approach is one of the leading motion planning techniques. Over the past decade the technique has been studied by many different researchers. This has le...
Roland Geraerts, Mark H. Overmars
JCM
2007
115views more  JCM 2007»
14 years 11 months ago
eEPC: an EPCglobal-compliant Embedded Architecture for RFID-based Solutions
— Radio Frequency Identification (RFID) technology has a lot of potential to improve visibility across the supply chain and automate the business processes. This paper describes ...
Franco Fummi, Giovanni Perbellini
TON
2008
131views more  TON 2008»
14 years 11 months ago
Capacity management and equilibrium for proportional QoS
Differentiated services architectures are scalable solutions for providing class-based Quality of Service (QoS) over packet switched networks. While qualitative attributes of the o...
Ishai Menache, Nahum Shimkin