Sciweavers

2698 search results - page 533 / 540
» Approximation Algorithms for the Weighted Independent Set Pr...
Sort
View
GECCO
2008
Springer
135views Optimization» more  GECCO 2008»
13 years 8 months ago
Context-dependent predictions and cognitive arm control with XCSF
While John Holland has always envisioned learning classifier systems (LCSs) as cognitive systems, most work on LCSs has focused on classification, datamining, and function appro...
Martin V. Butz, Oliver Herbort
CGF
2010
156views more  CGF 2010»
13 years 7 months ago
Mixed Finite Elements for Variational Surface Modeling
Many problems in geometric modeling can be described using variational formulations that define the smoothness of the shape and its behavior w.r.t. the posed modeling constraints....
Alec Jacobson, Elif Tosun, Olga Sorkine, Denis Zor...
DAC
2004
ACM
14 years 8 months ago
Memory access scheduling and binding considering energy minimization in multi-bank memory systems
Memory-related activity is one of the major sources of energy consumption in embedded systems. Many types of memories used in embedded systems allow multiple operating modes (e.g....
Chun-Gi Lyuh, Taewhan Kim
CAV
1999
Springer
119views Hardware» more  CAV 1999»
13 years 12 months ago
A Theory of Restrictions for Logics and Automata
BDDs and their algorithms implement a decision procedure for Quanti ed Propositional Logic. BDDs are a kind of acyclic automata. Unrestricted automata (recognizing unbounded string...
Nils Klarlund
CIKM
2009
Springer
13 years 11 months ago
Provenance query evaluation: what's so special about it?
While provenance has been extensively studied in the literature, the efficient evaluation of provenance queries remains an open problem. Traditional query optimization techniques...
Anastasios Kementsietsidis, Min Wang