Sciweavers

367 search results - page 63 / 74
» An overview of reservoir computing: theory, applications and...
Sort
View
IPSN
2009
Springer
14 years 3 months ago
Automating rendezvous and proxy selection in sensornets
As the diversity of sensornet use cases increases, the combinations of environments and applications that will coexist will make custom engineering increasingly impractical. We in...
David Chu, Joseph M. Hellerstein
ATAL
2009
Springer
14 years 3 months ago
Pragmatic-strategic reputation-based decisions in BDI agents
Computational trust and reputation models have been recognized as one of the key technologies required to design and implement agent systems. These models manage and aggregate the...
Isaac Pinyol, Jordi Sabater-Mir
HT
2009
ACM
14 years 3 months ago
On hypertext narrative
Annals and chronicles may be the foundation of accounting, but writers of stories and histories have long known that they seldom render a satisfactory account of complex events. I...
Mark Bernstein
DATE
2006
IEEE
104views Hardware» more  DATE 2006»
14 years 2 months ago
Equivalence verification of arithmetic datapaths with multiple word-length operands
Abstract: This paper addresses the problem of equivalence veriļ¬cation of RTL descriptions that implement arithmetic computations (add, mult, shift) over bitvectors that have diļ¬...
Namrata Shekhar, Priyank Kalla, Florian Enescu
PLDI
2006
ACM
14 years 2 months ago
Specifying distributed trust management in LolliMon
We propose the monadic linear logic programming language LolliMon as a new foundation for the speciļ¬cation of distributed trust management systems, particularly the RT framework...
Jeff Polakow, Christian Skalka