Sciweavers

2086 search results - page 290 / 418
» Mathematical Theory Exploration
Sort
View
CIIA
2009
13 years 9 months ago
LCF-style for Secure Verification Platform based on Multiway Decision Graphs
Abstract. Formal verification of digital systems is achieved, today, using one of two main approaches: states exploration (mainly model checking and equivalence checking) or deduct...
Sa'ed Abed, Otmane Aït Mohamed
DAC
2010
ACM
13 years 8 months ago
Parallel hierarchical cross entropy optimization for on-chip decap budgeting
Decoupling capacitor (decap) placement has been widely adopted as an effective way to suppress dynamic power supply noise. Traditional decap budgeting algorithms usually explore t...
Xueqian Zhao, Yonghe Guo, Zhuo Feng, Shiyan Hu
ATAL
2010
Springer
13 years 8 months ago
PAC-MDP learning with knowledge-based admissible models
PAC-MDP algorithms approach the exploration-exploitation problem of reinforcement learning agents in an effective way which guarantees that with high probability, the algorithm pe...
Marek Grzes, Daniel Kudenko
IJLT
2008
184views more  IJLT 2008»
13 years 7 months ago
Ad hoc transient communities: towards fostering knowledge sharing in learning networks
: To enhance users' social embedding within learning networks, we propose to establish ad hoc transient communities. These communities serve a particular goal, exist for a lim...
Adriana J. Berlanga, Peter B. Sloep, Liesbeth Kest...
DSL
2009
13 years 5 months ago
Varying Domain Representations in Hagl
Abstract. Experimental game theory is an increasingly important research tool in many fields, providing insight into strategic behavior through simulation and experimentation on ga...
Eric Walkingshaw, Martin Erwig