Sciweavers

1024 search results - page 65 / 205
» Value complete, column complete, predicate complete
Sort
View
CSCLP
2004
Springer
15 years 7 months ago
Better Propagation for Non-preemptive Single-Resource Constraint Problems
Abstract. Overload checking, forbidden regions, edge finding, and notfirst/not-last detection are well-known propagation rules to prune the start times of activities which have t...
Armin Wolf
ICDE
1997
IEEE
121views Database» more  ICDE 1997»
16 years 3 months ago
A Persistent Hyper-Programming System
We demonstrate the use of a hyper-programming system in building persistent applications. This allows program representations to contain type-safe links to persistent objects embe...
Graham N. C. Kirby, Ronald Morrison, David S. Munr...
ICIP
2006
IEEE
15 years 7 months ago
Public Key Watermarking for Reversible Image Authentication
In this paper, we propose a new public key watermarking scheme for reversible image authentication where if the image is authentic, the distortion due to embedding can be complete...
Sang-Kwang Lee, Young-Ho Suh, Yo-Sung Ho
NOMS
2006
IEEE
113views Communications» more  NOMS 2006»
15 years 7 months ago
Business-Oriented Capacity Planning of IT Infrastructure to Handle Load Surges
— This work proposes a business-oriented approach to designing IT infrastructure in an e-commerce context subject to load surges. The main difference between the proposed approac...
Filipe Marques, Jacques Philippe Sauvé, Ant...
LICS
2000
IEEE
15 years 6 months ago
Game Semantics and Subtyping
While Game Semantics has been remarkably successful at g, often in a fully abstract manner, a wide range of features of programming languages, there has to date been no attempt at...
Juliusz Chroboczek