Sciweavers

648 search results - page 77 / 130
» Using Criticalities as a Heuristic for Answer Set Programmin...
Sort
View
TDSC
2010
218views more  TDSC 2010»
14 years 9 months ago
Secure Data Objects Replication in Data Grid
—Secret sharing and erasure coding-based approaches have been used in distributed storage systems to ensure the confidentiality, integrity, and availability of critical informati...
Manghui Tu, Peng Li, I-Ling Yen, Bhavani M. Thurai...
ISQED
2005
IEEE
125views Hardware» more  ISQED 2005»
15 years 4 months ago
A New Method for Design of Robust Digital Circuits
As technology continues to scale beyond 100nm, there is a significant increase in performance uncertainty of CMOS logic due to process and environmental variations. Traditional c...
Dinesh Patil, Sunghee Yun, Seung-Jean Kim, Alvin C...
MCS
2009
Springer
15 years 5 months ago
Selective Ensemble under Regularization Framework
An ensemble is generated by training multiple component learners for a same task and then combining them for predictions. It is known that when lots of trained learners are availab...
Nan Li, Zhi-Hua Zhou
SEAL
1998
Springer
15 years 3 months ago
A Hybrid Tabu Search Algorithm for the Nurse Rostering Problem
Abstract. This paper deals with the problem of nurse rostering in Belgian hospitals. This is a highly constrained real world problem that was (until the results of this research we...
Edmund K. Burke, Patrick De Causmaecker, Greet Van...
ISORC
2008
IEEE
15 years 5 months ago
Usability Aspects of WCET Analysis
Knowing the program timing characteristics is fundamental to the successful design and execution of real-time systems. A critical timing measure is the worst-case execution time (...
Jan Gustafsson