Publications
Results per page: 10 25 50

ClusPath: A Temporal-driven Clustering to Infer Typical Evolution Paths

Marian-Andrei Rizoiu, Julien Velcin, Stéphane Bonnevay, Stéphane Lallich
We propose ClusPath, a novel algorithm for detecting general evolution tendencies in a population of individuals...
Data Mining and Knowledge Discovery - Friday 16th of September 2016

Efficient Dynamic Compressor Optimization in Natural Gas Transmission Systems

Terrence Mak, Pascal Van Hentenryck, Anatoly Zlotnik, Hassan Hijazi, Russell Bent
The growing reliance of electric power systems on gas-fired generation to balance intermittent sources of renewable energy has increased the variation and volume of flows through natural gas transmission pipelines...
The 2016 American Control Conference - Wednesday 6th of July 2016

Practical Undoability Checking via Contingent Planning

Jeanette Daum, Jörg Hoffmann, Patrik Haslum, Ingo Weber, Alvaro Torralba
We consider a general concept of undoability, asking whether a given action can always be undone, no matter which state it is applied to...
International Conference on Automated Planning and Scheduling (ICAPS) - Sunday 12th of June 2016

A Constraint Programming Approach to Fleet Design in Split-Delivery Multi-Compartment Vehicle Routing

Tommaso Urli, Philip Kilby
Multi-compartment vehicle routing problems (MCVRP, see Derigs et al. (2011)) arise daily in food logistics and fuel distribution...
Ninth Triennial Symposium on Transportation Analysis (TRISTAN IX) - Sunday 12th of June 2016

Rail Capacity Modelling With Constraint Programming

Daniel Harabor, Peter Stuckey
We describe a constraint programming approach to establish the coal transport capacity of the Central Queensland Coal Network; a large (2,670km) rail network in north-eastern Australia which was used to transport over 200 million tonnes of export coal from 37 regional loadout points in the year 2014...
Thirteenth International Conference on Integration of Artificial Intelligence and Operations Research Techniques in Constraint Programming (CPAIOR-16) - Sunday 29th of May 2016

Developing Dependable and Secure Cloud Applications

Ingo Weber, Surya Nepal, Liming Zhu
An ever-growing share of applications are provided as SaaS solutions on the basis of public cloud services, such as IaaS or PaaS offerings...
IEEE Internet Computing - Sunday 1st of May 2016

A Pipeline Framework for Heterogeneous Execution Environment of Big Data Processing

Dongyao Wu, Liming Zhu, Xiwei (Sherry) Xu, Sherif Sakr, Wei (Daniel) Sun, Qinghua Lu
Many real-world data analysis scenarios require pipelining and integration of multiple (big) data processing and analytics jobs, which are often executed in heterogeneous environments, such as MapReduce, Spark, R/Python/Bash scripts...
IEEE Software - Saturday 30th of April 2016

Comparative Evaluation of Action Recognition Methods via Riemannian Manifolds, Fisher Vectors and GMMs: Ideal and Challenging Conditions

Johanna Carvajal, Arnold Wiliem, Chris McCool, Brian Lovell, Conrad Sanderson
We present a comparative evaluation of various techniques for action recognition while keeping as many variables as possible controlled...
Workshop on Machine Learning for Sensory Data Analysis - Tuesday 19th of April 2016

Joint Recognition and Segmentation of Actions via Probabilistic Integration of Spatio-Temporal Fisher Vectors

Johanna Carvajal, Chris McCool, Brian Lovell, Conrad Sanderson
We propose a hierarchical approach to multi-action recognition that performs joint classification and segmentation...
Workshop on Machine Learning for Sensory Data Analysis - Tuesday 19th of April 2016

Complete, High-Assurance Determination of Loop Bounds and Infeasible Paths for WCET Analysis

Thomas Sewell, Felix Kam, Gernot Heiser
Worst-case execution time (WCET) analysis of real-time code needs to be performed on the executable binary code for soundness...
IEEE Real-Time and Embedded Technology and Applications Symposium - Monday 11th of April 2016