Sciweavers

648 search results - page 95 / 130
» Using Criticalities as a Heuristic for Answer Set Programmin...
Sort
View
99
Voted
ISCA
1993
IEEE
153views Hardware» more  ISCA 1993»
15 years 3 months ago
An Adaptive Cache Coherence Protocol Optimized for Migratory Sharing
Parallel programs that use critical sections and are executed on a shared-memory multiprocessor with a writeinvalidate protocol result in invalidation actions that could be elimin...
Per Stenström, Mats Brorsson, Lars Sandberg
ICRA
2003
IEEE
125views Robotics» more  ICRA 2003»
15 years 4 months ago
Online footstep planning for humanoid robots
We present an online algorithm for planning sequences of footstep locations that encode goal-directed navigation strategies for humanoid robots. Planning footsteps is more general...
James J. Kuffner Jr., Satoshi Kagami, Koichi Nishi...
106
Voted
ICTAI
2007
IEEE
15 years 5 months ago
Establishing Logical Rules from Empirical Data
We review a method of generating logical rules, or axioms, from empirical data. This method, using closed set properties of formal concept analysis, has been previously described ...
John L. Pfaltz
110
Voted
KBSE
2000
IEEE
15 years 2 months ago
Simultaneous Checking of Completeness and Ground Confluence
c specifications provide a powerful method for the specification of abstract data types in programming languages and software systems. Completeness and ground confluence are fundam...
Adel Bouhoula
176
Voted
ICDE
2008
IEEE
129views Database» more  ICDE 2008»
16 years 8 days ago
Optimal Boolean Matrix Decomposition: Application to Role Engineering
Abstract-- A decomposition of a binary matrix into two matrices gives a set of basis vectors and their appropriate combination to form the original matrix. Such decomposition solut...
Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri