Sciweavers

1695 search results - page 265 / 339
» Linear, Polynomial or Exponential
Sort
View
FPL
2006
Springer
120views Hardware» more  FPL 2006»
15 years 7 months ago
Regular Expression Software Deceleration for Intrusion Detection Systems
The use of reconfigurable hardware for network security applications has recently made great strides as FPGA devices have provided larger and faster resources. Regular expressions...
Zachary K. Baker, Viktor K. Prasanna, Hong-Jip Jun...
COLT
2000
Springer
15 years 7 months ago
The Role of Critical Sets in Vapnik-Chervonenkis Theory
In the present paper, we present the theoretical basis, as well as an empirical validation, of a protocol designed to obtain effective VC dimension estimations in the case of a si...
Nicolas Vayatis
ICRA
1995
IEEE
123views Robotics» more  ICRA 1995»
15 years 7 months ago
Vision-Based Reinforcement Learning for Purposive Behavior Acquisition
This paper presents a method of vision-based reinforcement learning by which a robot learns to shoot a ball into a goal, and discusses several issues in applying the reinforcement...
Minoru Asada, Shoichi Noda, Sukoya Tawaratsumida, ...
CSE
2009
IEEE
15 years 7 months ago
Rotation Scheduling and Voltage Assignment to Minimize Energy for SoC
— Low energy consumption is a critical issue in embedded systems design. As the technology feature sizes of SoC (Systems on Chip) become smaller and smaller, the percentage of le...
Meikang Qiu, Laurence Tianruo Yang, Edwin Hsing-Me...
BIRTHDAY
2008
Springer
15 years 6 months ago
AND/OR Multi-valued Decision Diagrams for Constraint Networks
The paper is an overview of a recently developed compilation data structure for graphical models, with specific application to constraint networks. The AND/OR Multi-Valued Decision...
Robert Mateescu, Rina Dechter