Sciweavers

113 search results - page 8 / 23
» Iterated Weaker-than-Weak Dominance
Sort
View
ASAP
2008
IEEE
199views Hardware» more  ASAP 2008»
13 years 9 months ago
An efficient method for evaluating polynomial and rational function approximations
In this paper we extend the domain of applicability of the E-method [7, 8], as a hardware-oriented method for evaluating elementary functions using polynomial and rational functio...
Nicolas Brisebarre, Sylvain Chevillard, Milos D. E...
EVOW
2010
Springer
13 years 5 months ago
Evolution of Grim Trigger in Prisoner Dilemma Game with Partial Imitation
The emergence of Grim Trigger as the dominant strategy in the Iterated Prisoner Dilemma (IPD) on a square lattice is investigated for players with finite memory, using three differ...
Degang Wu, Mathis Antony, Kwok Yip Szeto
WWW
2007
ACM
14 years 8 months ago
Towards the theoretical foundation of choreography
With the growth of interest on the web services, people pay increasingly attention to the choreography, that is, to describe collaborations of participants in accomplishing a comm...
Zongyan Qiu, Xiangpeng Zhao, Chao Cai, Hongli Yang
CHARME
2005
Springer
136views Hardware» more  CHARME 2005»
14 years 1 months ago
Acceleration of SAT-Based Iterative Property Checking
Today, verification is becoming the dominating factor for successful circuit designs. In this context formal verification techniques allow to prove the correctness of a circuit ...
Daniel Große, Rolf Drechsler
DATE
1997
IEEE
75views Hardware» more  DATE 1997»
13 years 11 months ago
Using constraint logic programming in memory synthesis for general purpose computers
In modern computer systems the performance is dominated by the memory performance. Currently, there is neither a systematic design methodology nor a tool for the design of memory ...
Renate Beckmann, Jürgen Herrmann