Sciweavers

2038 search results - page 155 / 408
» Loops under Strategies
Sort
View
SIGSOFT
2004
ACM
16 years 5 months ago
Heuristic-guided counterexample search in FLAVERS
One of the benefits of finite-state verification (FSV) tools, such as model checkers, is that a counterexample is provided when the property cannot be verified. Not all counterexa...
Jianbin Tan, George S. Avrunin, Lori A. Clarke, Sh...

Publication
325views
17 years 2 months ago
An Optimal Multi-Unit Combinatorial Procurement Auction with Single Minded Bidders
Abstract: The current art in optimal combinatorial auctions is limited to handling the case of single units of multiple items, with each bidder bidding on exactly one bundle (singl...
Sujit Guajr, Y Narahari
ICIP
2005
IEEE
16 years 6 months ago
Redundant-wavelet watermarking with pixel-wise masking
An algorithm is presented which implements image watermarking in the domain of an overcomplete, or redundant, wavelet transform. This algorithm expands on a previous method which ...
Kristen M. Parker, James E. Fowler
SOFSEM
2009
Springer
16 years 1 months ago
From Outermost Termination to Innermost Termination
Abstract. Rewriting is the underlying evaluation mechanism of functional programming languages. Therefore, termination analysis of term rewrite systems (TRSs) is an important techn...
René Thiemann
ICASSP
2009
IEEE
15 years 11 months ago
Game theory for precoding in a multi-user system: Bargaining for overall benefits
A precoding strategy for multi-user spectrum sharing over an interference channel is proposed and analyzed from a game-theoretic perspective. The proposed strategy is based on fi...
Jie Gao, Sergiy A. Vorobyov, Hai Jiang