Sciweavers

2976 search results - page 494 / 596
» On the bounded integer programming
Sort
View
RV
2010
Springer
171views Hardware» more  RV 2010»
13 years 5 months ago
Runtime Verification for Software Transactional Memories
Software transactional memories (STMs) promise simple and efficient concurrent programming. Several correctness properties have been proposed for STMs. Based on a bounded conflict ...
Vasu Singh
ENTCS
2010
101views more  ENTCS 2010»
13 years 5 months ago
Strengthening the Zipper
The zipper is a well known design pattern for providing a cursor-like interface to a data structure. However, the classic treatise by Huet only scratches the surface of some of it...
Tristan O. R. Allwood, Susan Eisenbach
TCIAIG
2010
13 years 2 months ago
Combining UCT and Nested Monte Carlo Search for Single-Player General Game Playing
Monte-Carlo tree search has recently been very successful for game playing particularly for games where the evaluation of a state is difficult to compute, such as Go or General Gam...
Jean Méhat, Tristan Cazenave
ICASSP
2011
IEEE
12 years 11 months ago
Design of UEP-based MSE-minimizing rateless codes for source-channel coding
This paper proposes a method to optimize the performance of tandem source–channel coding with respect to the mean-squared error by exploiting the unequal error protection coding...
Amirpasha Shirazinia, Lei Bao, Mikael Skoglund
ICASSP
2011
IEEE
12 years 11 months ago
Error-entropy based channel state estimation of spatially correlated MIMO-OFDM
—This paper deals with optimized training sequences to estimate multiple-input multiple-output orthogonal frequencydivision multiplexing (MIMO-OFDM) channel states in the presenc...
Hoang Duong Tuan, Ha Hoang Kha, Ha H. Nguyen