Sciweavers

2477 search results - page 178 / 496
» Approximate extended formulations
Sort
View
ICDCN
2009
Springer
15 years 9 months ago
Optimizing Multi-hop Queries in ZigBee Based Multi-sink Sensor Networks
Wireless sensor networks with multiple users collecting data directly from the sensors have many potential applications. An important problem is to allocate for each user a query r...
Bing Han, Gwendal Simon
AGENTS
2001
Springer
15 years 9 months ago
Using background knowledge to speed reinforcement learning in physical agents
This paper describes Icarus, an agent architecture that embeds a hierarchical reinforcement learning algorithm within a language for specifying agent behavior. An Icarus program e...
Daniel G. Shapiro, Pat Langley, Ross D. Shachter
121
Voted
ASPDAC
1999
ACM
77views Hardware» more  ASPDAC 1999»
15 years 9 months ago
Timing-Driven Bipartitioning with Replication Using Iterative Quadratic Programming
We present an algorithm for solving a general min-cut, twoway partitioning problem subject to timing constraints. The problem is formulated as a constrained programming problem an...
Shihliang Ou, Massoud Pedram
129
Voted
GLVLSI
1999
IEEE
85views VLSI» more  GLVLSI 1999»
15 years 9 months ago
S2P: A Stable 2-Pole RC Delay and Coupling Noise Metric
The Elmore delay is the metric of choice for performancedriven design applications due to its simple, explicit form and ease with which sensitivity information can be calculated. ...
Emrah Acar, Altan Odabasioglu, Mustafa Celik, Lawr...
FSE
1997
Springer
210views Cryptology» more  FSE 1997»
15 years 8 months ago
Partitioning Cryptanalysis
Matsui's linear cryptanalysis for iterated block ciphers is generalized to an attack called. This attack exploits a weakness that can be described by an e ective partition-pa...
Carlo Harpes, James L. Massey