Sciweavers

608 search results - page 48 / 122
» On Dependent Randomized Rounding Algorithms
Sort
View
ATS
2009
IEEE
113views Hardware» more  ATS 2009»
14 years 3 months ago
Deterministic Algorithms for ATPG under Leakage Constraints
—Measuring the steady state leakage current (IDDQ) is very successful in detecting faults not discovered by standard fault models. But vector dependencies of IDDQ decrease the re...
Gorschwin Fey
AAAI
1994
13 years 10 months ago
An Algorithm for Probabilistic Least-Commitment Planning
We de ne the probabilistic planning problem in terms of a probability distribution over initial world states, a boolean combination of goal propositions, a probability threshold, ...
Nicholas Kushmerick, Steve Hanks, Daniel S. Weld
SACRYPT
2007
Springer
141views Cryptology» more  SACRYPT 2007»
14 years 2 months ago
Analysis of Countermeasures Against Access Driven Cache Attacks on AES
Cache attacks on implementations of cryptographic algorithms have turned out to be very powerful. Progress in processor design, e.g., like hyperthreading, requires to adapt models ...
Johannes Blömer, Volker Krummel
SEFM
2007
IEEE
14 years 3 months ago
Hardness for Explicit State Software Model Checking Benchmarks
Directed model checking algorithms focus computation resources in the error-prone areas of concurrent systems. The algorithms depend on some empirical analysis to report their per...
Neha Rungta, Eric G. Mercer
ICCBR
2009
Springer
14 years 3 months ago
S-Learning: A Model-Free, Case-Based Algorithm for Robot Learning and Control
A model-free, case-based learning and control algorithm called S-learning is described as implemented in a simulation of a light-seeking mobile robot. S-learning demonstrated learn...
Brandon Rohrer