Sciweavers

1400 search results - page 178 / 280
» On multiplication in finite fields
Sort
View
TVLSI
2008
140views more  TVLSI 2008»
13 years 10 months ago
A Novel Mutation-Based Validation Paradigm for High-Level Hardware Descriptions
We present a Mutation-based Validation Paradigm (MVP) technology that can handle complete high-level microprocessor implementations and is based on explicit design error modeling, ...
Jorge Campos, Hussain Al-Asaad
IJCV
2002
111views more  IJCV 2002»
13 years 9 months ago
Linear Multi View Reconstruction and Camera Recovery Using a Reference Plane
This paper presents a linear algorithm for simultaneous computation of 3D points and camera positions from multiple perspective views based on having a reference plane visible in a...
Carsten Rother, Stefan Carlsson
JSYML
2002
170views more  JSYML 2002»
13 years 9 months ago
Representability in Second-Order Propositional Poly-Modal Logic
A propositional system of modal logic is second-order if it contains quantifiers p and p, which, in the standard interpretation, are construed as ranging over sets of possible worl...
Gian Aldo Antonelli, Richmond H. Thomason
TCAD
2002
139views more  TCAD 2002»
13 years 9 months ago
Digital filter synthesis based on an algorithm to generate all minimal signed digit representations
In this paper, the authors propose an algorithm to find all the minimal signed digit (MSD) representations of a constant and present an algorithm to synthesize digital filters base...
In-Cheol Park, Hyeong-Ju Kang
COLT
2010
Springer
13 years 8 months ago
An Asymptotically Optimal Bandit Algorithm for Bounded Support Models
Multiarmed bandit problem is a typical example of a dilemma between exploration and exploitation in reinforcement learning. This problem is expressed as a model of a gambler playi...
Junya Honda, Akimichi Takemura