From the bitsavers.org collection, a scanned-in computer-related document. mit :: tx-2 :: Sketchpad TR296 Jan63

Topics: sketchpad, display, pen, drawing, constraint, picture, constraints, lines, instance, light pen,...

From the bitsavers.org collection, a scanned-in computer-related document. mit :: tx-2 :: Sketchpad A Man-Machine Graphical Communication System Jan63

Topics: sketchpad, display, pen, drawing, constraint, figure, picture, constraints, lines, light pen, ring...

From the bitsavers.org collection, a scanned-in computer-related document. ibm :: generalInfo :: E20-0164-0 Linear Programming - Cotton Blending and Production Allocation 1965

Topics: cotton, blend, optimal, inventory, raw, yarn, model, constraint, linear, cost, raw cotton, linear...

From the bitsavers.org collection, a scanned-in computer-related document. ibm :: generalInfo :: E20-0161-0 Linear Programming - Meat Blending 1966

Topics: ingredient, meat, pork, protein, ingredients, fat, cost, color, constraints, constraint, bull meat,...

Bell System Technical Journal, 48: 3. March 1969 pp 729-742. Convolutional Reed-Solomon Codes. (Ebert, P.M.; Tong, S.Y.)

Topics: codes, code, constraint, nonzero, error, decoding, convolutional, correcting, character, symbols,...

From the bitsavers.org collection, a scanned-in computer-related document. mitre :: ESD Technical Reports :: ESD-TR-69-273 TRACE-D Users Manual Jul69

Topics: data, input, cvj, pti, trajectory, observation, pci, orbit, station, deck, orbit determination,...

Bell System Technical Journal, 49: 9. November 1970 pp 2289-2302. Pull-In Range of a Phase-Locked Loop With a Binary Phase Comparator. (Oberst, James F.)

Topics: equation, phase, pll, exp, frequency, binary, coth, loop, jitter, equations, loop filters, loop...

Bell System Technical Journal, 55: 9. November 1976 pp 1423-1435. Optimum Quantizer Design Using a Fixed-Point Algorithm. (Netravali, A.N.; Saigal, R.)

Topics: entropy, quantizer, quantizers, optimum, distortion, simplex, quantization, algorithm, constraint,...

Journal of Research of the National Bureau of Standards

Topics: Anholonomic, constraint, electromagnetism, Hamilton, Maxwell, momentum, Poynting, variational

Bell System Technical Journal, 57: 5. May-June 1978 pp 1663-1697. Analytical Foundation for Low-Frequency Power-Telephone Interference. (Parker, J.C. Jr.)

Topics: circuit, longitudinal, coupling, voltage, conductor, current, shielding, conductors, segment,...

12
12

1988
1988

1988
by
Leler, Wm. (William)

texts

######
eye 12

######
favorite 0

######
comment 0

vi, 202 pages : 24 cm

Topics: programmeertalen, programming, Programming, Programming Languages, programming languages,...

49
49

1989
1989

1989
by
Van Hentenryck, Pascal

texts

######
eye 49

######
favorite 1

######
comment 0

This book tackles classic problems from operations research and circuit design using a logic programming language embedding consistency techniques, a paradigm emerging from artificial intelligence research. Van Hentenryck proposes a new approach to solving discrete combinatorial problems using these techniques. Logic programming serves as a convenient language for stating combinatorial problems, but its "generate and test" paradigm leads to inefficient programs. Van Hentenryck's...

Topics: COMPUTERS / Computer Science, Logic programming, Constraint programming (Computer science),...

This thesis compares the efficiency of a constraint branch-and-bound method against the conventional variable branch-and-bound method in solving set partitioning problems. Because of the difficulties encountered in writing the constraint branch-and-bound subroutine, it was necessary to solve each subproblem encountered from scratch. This is in contrast to the variable branching code which, when solving closely related subproblems, essentially starts from an advanced starting solution. Even...

Topics: Operations research, Problem solving., Set partitioning problem, constraint branch and bound...

Since 1953 there has been a fierce military competition between the Republic of Korea (ROK) and the Democratic People's Republic of Korea (DPRK). The DPRK has committed over 10% of its GNP since 1963 to defense expenditures, whereas, the ROK has spent a relatively small portion (3-6%) of GNP over the same period. Because the U.S. plans to withdraw from the ROK in the near future, a heavy burden will be imposed upon the South Korean government to maintain its national defense. The U.S....

Topics: Balance of power, Armed Forces, Appropriations and expenditures, Dissertations, Academic., Korea,...

Estimating the frequencies of signals in a noisy environment has numerous applications in digital signal processing. In December 1980, Golub and Van Loan proposed a spectral estimator called the Total Least Squares (TLS) technique which is a refinement of the Least Squares (LS) technique. In this thesis, we first describe the origin of the TLS technique and its applications to frequency estimation. Furthermore, we present a numerical implementation for resolving two damped / undamped...

Topics: TLS Algorithm, Constrained TLS Algorithm, Linear Constraint TLS Algorithm, Recursive TLS Algorithm

4
4.0

1994
1994

1994
by
Watson, Mark, 1951-

texts

######
eye 4

######
favorite 0

######
comment 0

xviii, 218 pages ; 24 cm +

Topics: Object-oriented programming (Computer science), C++ (Computer program language), Constraint...

Interactive programming environment for language offer many advantages over traditional batch-oriented ones, such as immediate static analysis. One form of analysis is type checking, yet type checking in this setting for languages with common features like overloading has received little attention. We implement an interactive type checker for the polymorphic type system of ML with overloading. The implementation was produced automatically from an attribute grammar using the Synthesizer...

Topic: Overloading, Polymorphism, Type Inference, Attribute Grammar, SynGen, Incremental, Constrained Type...

1
1.0

texts

######
eye 1

######
favorite 0

######
comment 0

ix, 316 p. : 24 cm

Topic: Constraint programming (Computer science)

0
0.0

texts

######
eye 0

######
favorite 0

######
comment 0

287 p. : 25 cm

Topic: Constraint programming (Computer science)

2
2.0

1996
1996

1996
by
International Monetary Fund. Research Department

texts

######
eye 2

######
favorite 0

######
comment 0

1 online resource (200 pages)

Topics: Responsible fiscal policy, Electronic books, Restructuring, Retail price index, Reduction of...

Enhanced solution techniques are developed for solving integer programs (IPs) and mixed-integer programs (MIPs). Previously unsolvable problems can be solved with these new techniques. We develop knapsack cut-finding procedures for minimal cover cuts, and convert existing cut-strengthening theory into practical procedures that lift and tighten violated minimal cover valid inequalities to violated knapsack facets in polynomial time. We find a new class of knapsack cuts called 'non-minimal cover...

Topics: OPTIMIZATION, Optimization, Integer Programming, Knapsack facets, Constraint branching, Generalized...

Folkscanomy: A Library of Books

265
265

1998
1998

1998
by
CP98 (1998 : Pisa, Italy); Maher, Michael, 1959-; Puget, Jean-Francois

texts

######
eye 265

######
favorite 0

######
comment 0

Principles and Practice of Constraint Programming — CP98: 4th International Conference, CP98 Pisa, Italy, October 26–30, 1998 Proceedings Author: Michael Maher, Jean-Francois Puget Published by Springer Berlin Heidelberg ISBN: 978-3-540-65224-3 DOI: 10.1007/3-540-49481-2 Table of Contents: Open Constraint Programming Constructing Constraints The Dynamics of Dynamic Variable Ordering Heuristics On Completion of Constraint Handling Rules Error-correcting Source Code Optimized Q-pivot for...

Topic: Constraint programming (Computer science)

1
1.0

1998
1998

1998
by
Marriott, Kim

texts

######
eye 1

######
favorite 1

######
comment 0

xiv, 467 pages : 26 cm

Topics: Logic programming, Constraint programming (Computer science), Programmation logique, Programmation...

0
0.0

1999
1999

1999
by
CP'99 (1999 : Alexandria, Va.)

texts

######
eye 0

######
favorite 0

######
comment 0

xii, 491 p. : 24 cm

Topic: Constraint programming (Computer science) -- Congresses

Folkscanomy: A Library of Books

233
233

2000
2000

2000
by
Apt, Krzysztof R. (DE-601)283007168; European Network of Excellence in Computational Logic (DE-601)329250795 (DE-588)6117827-5; European Research Consortium for Informatics and Mathematics (DE-601)212164465 (DE-588)2156435-8; Joint ERCIM Compulog Net Workshop (1999.10.25-27 Paphos); Workshop on Constraints (1999.10.25-27 Paphos)

texts

######
eye 233

######
favorite 0

######
comment 0

New Trends in Constraints: Joint ERCIM/Compulog NetWorkshop Paphos, Cyprus, October 25–27, 1999 Selected Papers Author: Krzysztof R. Apt, Eric Monfroy, Antonis C. Kakas, Francesca Rossi Published by Springer Berlin Heidelberg ISBN: 978-3-540-67885-4 DOI: 10.1007/3-540-44654-0 Table of Contents: Interval Constraints: Results and Perspectives A Constraint-Based Language for Virtual Agents Constraint (Logic) Programming: A Survey on Research and Applications OPL Script: Composing and Controlling...

Topics: Constraint-Programmierung, Online-Publikation, Kongress, Paphos

Folkscanomy: A Library of Books

261
261

2000
2000

2000
by
Deransart, Pierre; Hermenegildo, Manuel; Małuszyński, J. (Jan), 1941-

texts

######
eye 261

######
favorite 0

######
comment 0

Analysis and Visualization Tools for Constraint Programming: Constraint Debugging Author: Pierre Deransart, Manuel V. Hermenegildo, Jan Małuszynski Published by Springer Berlin Heidelberg ISBN: 978-3-540-41137-6 DOI: 10.1007/10722311 Table of Contents: Debugging of Constraint Programs: The DiSCiPl Methodology and Tools An Assertion Language for Constraint Logic Programs A Generic Preprocessor for Program Validation and Debugging Assertions with Constraints for CLP Debugging Locating Type...

Topic: Constraint programming (Computer science)

Principles and Practice of Constraint Programming – CP 2000: 6th International Conference, CP 2000 Singapore, September 18–21, 2000 Proceedings Author: Rina Dechter Published by Springer Berlin Heidelberg ISBN: 978-3-540-41053-9 DOI: 10.1007/3-540-45349-0 Table of Contents: Constraint-Based Agents: The ABC’s of CBA’s Constraints for Interactive Graphical Applications Meta-complexity Theorems: Talk Abstract Automatic Generation of Propagation Rules for Finite Domains Extending Forward...

Topic: Constraint programming (Computer science)

Constraint-Based Agents: An Architecture for Constraint-Based Modeling and Local-Search-Based Reasoning for Planning and Scheduling in Open and Dynamic Worlds Author: Alexander Nareyek Published by Springer Berlin Heidelberg ISBN: 978-3-540-42258-7 DOI: 10.1007/3-540-45746-1 Table of Contents: Introduction Using Global Constraints for Local Search Structural Constraint Satisfaction The Planning Model Application Conclusion Future Work Internet Links The “Send More Money” Problem Choice...

Topics: Intelligent agents (Computer software), Constraint programming (Computer science), Computer games

Principles and Practice of Constraint Programming — CP 2001: 7th International Conference, CP 2001 Paphos, Cyprus, November 26 – December 1, 2001 Proceedings Author: Toby Walsh Published by Springer Berlin Heidelberg ISBN: 978-3-540-42863-3 DOI: 10.1007/3-540-45578-7 Table of Contents: Hybrid Benders Decomposition Algorithms in Constraint Logic Programming Branch-and-Check: A Hybrid Framework Integrating Mixed Integer Programming and Constraint Logic Programming Towards Inductive Constraint...

Topic: Constraint programming (Computer science)

3
3.0

2002
2002

2002
by
SARA 2002 (2002 : Kananaskis, Alta.)

texts

######
eye 3

######
favorite 0

######
comment 0

xi, 346 pages : 24 cm

Topics: Computer science -- Congresses, Artificial intelligence -- Congresses, Artificial intelligence,...

11
11

2002
2002

2002
by
FroCoS (Symposium) (4th : 2002 : Santa Margherita Ligure, Italy)

texts

######
eye 11

######
favorite 0

######
comment 0

viii, 254 pages : 24 cm

Topics: Logic, Symbolic and mathematical -- Congresses, Computer science -- Congresses, Logique symbolique...

44
44

2003
2003

2003
by
Apt, Krzysztof R., 1949-

texts

######
eye 44

######
favorite 1

######
comment 0

xii, 407 p. : 26 cm

Topic: Constraint programming (Computer science)

Source: removedNEL

152
152

2003
2003

2003
by
Dechter, Rina, 1950-

texts

######
eye 152

######
favorite 0

######
comment 0

Includes bibliographical references (p. [441]-458) and index

Topics: Artificial intelligence, Computer Programming, Constraint programming (Computer science),...

Semirings for Soft Constraint Solving and Programming Author: Stefano Bistarelli Published by Springer Berlin Heidelberg ISBN: 978-3-540-21181-5 DOI: 10.1007/b95712 Table of Contents: 1. Introduction 2. Soft Constraint Satisfaction Problems 3. Towards SCSPs Solutions 4. SCSP Abstraction 5. Higher Order Semiring-Based Constraints 6. Soft CLP 7. SCLP and Generalized Shortest Path Problems 8. Soft Concurrent Constraint Programming 9. Interchangeability in Soft CSPs 10. SCSPs for Modelling Attacks...

Topic: Constraint programming (Computer science)

Folkscanomy: A Library of Books

362
362

2004
2004

2004
by
Joint ERCIM/CoLogNet International Workshop on Constraint Solving and Constraint Logic Programming (2003 : Budapest, Hungary); Apt, Krzysztof R., 1949-; European Research Consortium for Informatics and Mathematics; CoLogNET

texts

######
eye 362

######
favorite 1

######
comment 0

Recent Advances in Constraints: Joint ERCIM/CoLogNET International Workshop on Constraint Solving and Constraint Logic Programming, CSCLP 2003, Budapest, Hungary, June 30 - July 2, 2003. Selected Papers Author: Krzysztof R. Apt, François Fages, Francesca Rossi, Péter Szeredi, Josef Váncza Published by Springer Berlin Heidelberg ISBN: 978-3-540-21834-0 DOI: 10.1007/b96986 Table of Contents: A Comparative Study of Arithmetic Constraints on Integer Intervals Clustering for Disconnected Solution...

Topics: Constraint programming (Computer science), Logic programming, Programmation par contraintes,...

Folkscanomy: A Library of Books

106
106

2004
2004

2004
by
CDB 2004 (2004 : Paris, France); Kuijpers, Bart; Revesz, Peter (Peter Z.)

texts

######
eye 106

######
favorite 0

######
comment 0

Constraint Databases: First International Symposium, CDB 2004, Paris, France, June 12-13, 2004. Proceedings Author: Bart Kuijpers, Peter Revesz Published by Springer Berlin Heidelberg ISBN: 978-3-540-22126-5 DOI: 10.1007/b98003 Table of Contents: Constraint Databases, Data Structures and Efficient Query Evaluation A New Shape Function Based Spatiotemporal Interpolation Method Moving Objects and Their Equations of Motion A Triangle-Based Logic for Affine-Invariant Querying of Two-Dimensional...

Topics: Constraint databases, Database management

Principles and Practice of Constraint Programming – CP 2004: 10th International Conference, CP 2004, Toronto, Canada, September 27 -October 1, 2004. Proceedings Author: Mark Wallace Published by Springer Berlin Heidelberg ISBN: 978-3-540-23241-4 DOI: 10.1007/b100482 Table of Contents: Constraints in Program Analysis and Verification Constraint Programming Next Challenge: Simplicity of Use Algorithmic Adventures at the Interface of Computer Science, Statistical Physics, and Combinatorics...

Topic: Constraint programming (Computer science)

Folkscanomy: A Library of Books

366
366

2004
2004

2004
by
International Conference on Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimisation Problems (1st : 2004 : Nice, France); Régin, Jean-Charles; Rueher, Michel

texts

######
eye 366

######
favorite 0

######
comment 0

Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems: First International Conference, CPAIOR 2004, Nice, France, April 20-22, 2004. Proceedings Author: Jean-Charles Régin, Michel Ruehe Published by Springer Berlin Heidelberg ISBN: 978-3-540-21836-4 DOI: 10.1007/b96957 Table of Contents: Using MILP and CP for the Scheduling of Batch Chemical Processes SIMPL: A System for Integrating Optimization Techniques A New Exact Solution Algorithm for the...

Topics: Constraints (Artificial intelligence), Constraint programming (Computer science), Combinatorial...

This thesis presents a formal analysis process and the results of applying that process to the MLS LAN: TCB-to- TCBE, Session Status, and TCBE-to-Session Server Protocols. The formal analysis process consists of several distinct stages: the creation of a detailed informal protocol description, analyzing that description to reveal assumptions and areas of interest not directly addressed in the protocol description, the transformation of that description and the related assumptions into a formal...

Topics: Computer networks, Constraint programming (Computer science), Constraints (Artificial...

11
11

2005
2005

2005
by
FroCoS (Symposium) (5th : 2005 : Vienna, Austria)

texts

######
eye 11

######
favorite 0

######
comment 0

1 online resource (x, 320 pages) :

Topics: Logic, Symbolic and mathematical -- Congresses, Computer science -- Congresses, Informatique --...

8
8.0

2005
2005

2005
by
Joint ERCIM/CoLogNet International Workshop on Constraint Solving and Constraint Logic Programming (2004 : Lausanne, Switzerland)

texts

######
eye 8

######
favorite 0

######
comment 0

1 online resource (x, 215 pages) :

Topics: Constraint programming (Computer science) -- Congresses, Logic programming -- Congresses,...

42
42

movies

######
eye 42

######
favorite 0

######
comment 0

SafeHarbor was an experimental constraint based television program broadcasted on TCTV in Olympia WA. Episode 3 features work by... Brad Hutchinson Jon Clark Morgan Dusakto Thomas Cooney Spencer Williams Will Erokan

Topics: experimental, constraint, vidster, olympia, public access, Will Erokan, Thomas Cooney, Morgan...

36
36

movies

######
eye 36

######
favorite 1

######
comment 0

SafeHarbor was an experimental constraint based television program broadcasted on TCTV in Olympia WA. Episode 1 features work by... Brad Hutchinson Jed Smith Morgan Dusakto Thomas Cooney Emily Mercer Ta Neil Adams Will Erokan

Topics: experimental, constraint, vidster, olympia, public access

28
28

movies

######
eye 28

######
favorite 0

######
comment 0

SafeHarbor was an experimental constraint based television program broadcasted on TCTV in Olympia WA. Episode 2 features work by... Brad Hutchinson Jed Smith Morgan Dusakto Thomas Cooney Will Erokan

Topics: experimental, constraint, vidster, olympia, public access, Will Erokan, Brad Hutchinson, Jed Smith,...

The U.S. Navy is interested in acquiring systems that promote the use of Services-oriented Architecture (SOA) and Open Architecture (OA) in Integrated Warfare Systems (IWS). The number of systems required to share data and provide reliable information in weapons systems is growing. Many systems, systems-of-systems and families of systems with different software architectures are acquired and often have difficulty operating together, which causes delays, increases costs, and limits re-use....

Topics: Constraint programming (Computer science), Intelligent agents (Computer software), Computer network...

77,261
77K

2010
2010

2010
by
MIT OpenCourseWare

movies

######
eye 77,261

######
favorite 7

######
comment 1

View the complete course: http://ocw.mit.edu/6-034F10 Instructor: Patrick Winston In these lectures, Prof. Patrick Winston introduces the 6.034 material from a conceptual, big-picture perspective. Topics include reasoning, search, constraints, learning, representations, architectures, and probabilistic inference. In these mega-recitations, teaching assistant Mark Seifter works through problems from previous exams in a lecture-style setting. Students are asked to participate, and emphasis is...

( 1 reviews )

Topics: artificial intelligence, patrick winston, search, machine learning, representation, architecture,...

4
4.0

2010
2010

2010
by
A. Myronenko; X. Song

texts

######
eye 4

######
favorite 0

######
comment 0

Point set registration is a key component in many computer vision tasks. The goal of point set registration is to assign correspondences between two sets of points and to recover the transformation that maps one point set to the other. Multiple factors, including an unknown nonrigid spatial transformation, large dimensionality of point set, noise, and outliers, make the point set registration a challenging problem. We introduce a probabilistic method, called the Coherent Point Drift (CPD)...

Topics: Gaussian processes, computational complexity, computer vision, estimation theory,...

Source: http://academictorrents.com/details/e280d7e19118f144162e7be7dba37f70c12c26ed

91
91

Jun 30, 2014
06/14

Jun 30, 2014
by
Mahua Bhowmik, Suma Dupalli, Dhanashri Saindane & Gitanjali Murumkar

texts

######
eye 91

######
favorite 0

######
comment 0

This paper describes the modeling of a micro sensor node for wireless sensor network. This model allows studying the impact of hardware and software choices into the node autonomy. This model is used to evaluate the best configuration of a sensor node according to the application specifications and eventually to underline to need to design a specific element for the target application. We are presenting the model of micro sensor node and energy model in order...

Topics: Energy Model, Micro Sensor Node, Power Constraint, Wireless

69
69

2015
2015

2015
by
Innovative Research Publications

texts

######
eye 69

######
favorite 0

######
comment 0

In order to overcome the limitation when using traditional genetic algorithm in solving constrained optimization problems, this paper presents a new method of constrain handling to solve the constrained optimization problems. Firstly, the method makes full use of the condensed characteristics of the KS function to transform multi-constrained optimization problem into a single constraint optimization problem. And then a group penalty method is adopted by genetic algorithm. Aggregate constraint...

Topics: KS function, grouping penalty, genetic algorithm, constraint handling

Paul Giem on Beta-Pseudoglobin and Common Descent 5-9-2015 A recent article argues that the beta-globin pseudogene is in fact used in regulating hemoglobin productions. This would destroy the argument that it is a shared mistake proving the common ancestry of apes and humans. The history of the controversy is reviewed. 1. Gilbert, G. 1993. In search of Genesis and the pseudogene. Spectrum 22(4): 10-21. 2. Chang, L-YE, J. L. Slightom. 1984. Isolation and nucleotide sequence analysis of the...

Topics: Second, Look, Seminars, Faith, Science, Loma, Linda, University, Church, CA, California,...