Sciweavers

2421 search results - page 43 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
GECCO
2004
Springer
197views Optimization» more  GECCO 2004»
14 years 4 months ago
Applying Evolutionary Testing to Search for Critical Defects
Software systems are used regularly in safety-relevant applications. Therefore, the occurrence of critical defects may not only cause costly recalls but may also endanger human liv...
André Baresel, Harmen Sthamer, Joachim Wege...
DATE
2003
IEEE
92views Hardware» more  DATE 2003»
14 years 4 months ago
An Integrated Approach for Improving Cache Behavior
The widening gap between processor and memory speeds renders data locality optimization a very important issue in data-intensive embedded applications. Throughout the years hardwa...
Gokhan Memik, Mahmut T. Kandemir, Alok N. Choudhar...
JMLR
2010
148views more  JMLR 2010»
13 years 5 months ago
A Generalized Path Integral Control Approach to Reinforcement Learning
With the goal to generate more scalable algorithms with higher efficiency and fewer open parameters, reinforcement learning (RL) has recently moved towards combining classical tec...
Evangelos Theodorou, Jonas Buchli, Stefan Schaal
TIP
2010
165views more  TIP 2010»
13 years 5 months ago
A Novel Approach to FRUC Using Discriminant Saliency and Frame Segmentation
Motion-Compensated Frame Interpolation (MCFI) is a technique used extensively for increasing the temporal frequency of a video sequence. In order to obtain a high quality interpola...
Natan Jacobson, Yen-Lin Lee, Vijay Mahadevan, Nuno...
ISVLSI
2007
IEEE
131views VLSI» more  ISVLSI 2007»
14 years 5 months ago
Improving the Quality of Bounded Model Checking by Means of Coverage Estimation
Formal verification has become an important step in circuit and system design. A prominent technique is Bounded Model Checking (BMC) which is widely used in industry. In BMC it i...
Ulrich Kühne, Daniel Große, Rolf Drechs...