Sciweavers

459 search results - page 48 / 92
» A heuristic approach for multiple restricted multiplication
Sort
View
JAIR
2011
214views more  JAIR 2011»
12 years 10 months ago
Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness
There has been significant recent interest in game theoretic approaches to security, with much of the recent research focused on utilizing the leader-follower Stackelberg game mo...
Dmytro Korzhyk, Zhengyu Yin, Christopher Kiekintve...
ROBIO
2006
IEEE
130views Robotics» more  ROBIO 2006»
14 years 1 months ago
GA-Based Multi-Objective Optimal Design of a Planar 3-DOF Cable-Driven Parallel Manipulator
— The architecture optimization of a three degrees of freedom (3-DOF) planar cable-driven parallel manipulator (CDPM) with multiple objectives has been implemented by means of GA...
Yangmin Li, Qingsong Xu
IPPS
2005
IEEE
14 years 1 months ago
Reliability-Conscious Process Scheduling under Performance Constraints in FPGA-Based Embedded Systems
This paper proposes, for the FPGA-based embedded systems, a reliability-aware process scheduling strategy that operates under performance bounds. A unique characteristic of the pr...
Guilin Chen, Mahmut T. Kandemir, Suleyman Tosun, U...
VLDB
1990
ACM
143views Database» more  VLDB 1990»
13 years 11 months ago
Synthesizing Database Transactions
Database programming requires having the knowledge of database semantics both to maintain database integrity and to explore more optimization opportunities. Automated programming ...
Xiaolei Qian
LWA
2008
13 years 9 months ago
Making Legacy LMS adaptable using Policy and Policy templates
In this paper, we discuss how users and designers of existing learning management systems (LMSs) can make use of policies to enhance adaptivity and adaptability. Many widespread L...
Arne Wolf Koesling, Eelco Herder, Juri Luca De Coi...