Sciweavers

730 search results - page 22 / 146
» Developing a Foundation for Code Optimization
Sort
View
AIPS
2003
13 years 10 months ago
Synthesis of Hierarchical Finite-State Controllers for POMDPs
We develop a hierarchical approach to planning for partially observable Markov decision processes (POMDPs) in which a policy is represented as a hierarchical finite-state control...
Eric A. Hansen, Rong Zhou
GECCO
2006
Springer
166views Optimization» more  GECCO 2006»
14 years 19 days ago
Solving identification problem for asynchronous finite state machines using genetic algorithms
A Genetic Algorithm, embedded in a simulation-based method, is applied to the identification of Asynchronous Finite State Machines. Two different coding schemes and their associat...
Xiaojun Geng
JIT
1999
Springer
123views Database» more  JIT 1999»
14 years 1 months ago
Byte Code Engineering
The term “Java” is used to denote two different concepts: the language itself and the related execution environment, the Java Virtual Machine (JVM), which executes byte code in...
Markus Dahm
STOC
1998
ACM
111views Algorithms» more  STOC 1998»
14 years 1 months ago
A Deterministic Strongly Polynomial Algorithm for Matrix Scaling and Approximate Permanents
We present a deterministic strongly polynomial algorithm that computes the permanent of a nonnegative n × n matrix to within a multiplicative factor of en. To this end we develop...
Nathan Linial, Alex Samorodnitsky, Avi Wigderson
SP
2000
IEEE
105views Security Privacy» more  SP 2000»
14 years 1 months ago
Open Source in Security: Visiting the Bizarre
Although open-source software development has virtues, there is reason to believe that the approach would not have a significant effect on the security of today’s systems. The ...
Fred B. Schneider