Sciweavers

291 search results - page 41 / 59
» Implementation with a bounded action space
Sort
View
FOCS
1998
IEEE
13 years 11 months ago
Jitter Control in QoS Networks
We study jitter control in networks with guaranteed quality of service (QoS) from the competitive analysis point of view: we propose on-line algorithms that control jitter and comp...
Yishay Mansour, Boaz Patt-Shamir
VRST
1997
ACM
13 years 11 months ago
View volume culling using a probabilistic caching scheme
This paper describes a new algorithm for view volume culling. During an interactive walkthrough of a 3D scene, at any moment a large proportion of objects will be outside of the v...
Mel Slater, Yiorgos Chrysanthou
NIPS
2007
13 years 9 months ago
Consistent Minimization of Clustering Objective Functions
Clustering is often formulated as a discrete optimization problem. The objective is to find, among all partitions of the data set, the best one according to some quality measure....
Ulrike von Luxburg, Sébastien Bubeck, Stefa...
TCOM
2008
119views more  TCOM 2008»
13 years 7 months ago
Maximum likelihood detection for differential unitary space-time modulation with carrier frequency offset
Can conventional differential unitary space time modulation (DUSTM) be applied when there is an unknown carrier frequency offset (CFO)? This paper answers this question affirmative...
Feifei Gao, Tao Cui, Arumugam Nallanathan, Chintha...
ISCA
2012
IEEE
248views Hardware» more  ISCA 2012»
11 years 10 months ago
Watchdog: Hardware for safe and secure manual memory management and full memory safety
Languages such as C and C++ use unsafe manual memory management, allowing simple bugs (i.e., accesses to an object after deallocation) to become the root cause of exploitable secu...
Santosh Nagarakatte, Milo M. K. Martin, Steve Zdan...