Sciweavers

3053 search results - page 118 / 611
» Performance of Generative Programming Based Protocol Impleme...
Sort
View
DATE
2009
IEEE
120views Hardware» more  DATE 2009»
14 years 5 months ago
Optimizing data flow graphs to minimize hardware implementation
Abstract - This paper describes an efficient graphbased method to optimize data-flow expressions for best hardware implementation. The method is based on factorization, common su...
Daniel Gomez-Prado, Q. Ren, Maciej J. Ciesielski, ...
ISSS
1999
IEEE
157views Hardware» more  ISSS 1999»
14 years 2 months ago
Bit-Width Selection for Data-Path Implementations
Specifications of data computations may not necessarily describe the ranges of the intermediate results that can be generated. However, such information is critical to determine t...
Carlos Carreras, Juan A. López, Octavio Nie...
ICML
2002
IEEE
14 years 11 months ago
Algorithm-Directed Exploration for Model-Based Reinforcement Learning in Factored MDPs
One of the central challenges in reinforcement learning is to balance the exploration/exploitation tradeoff while scaling up to large problems. Although model-based reinforcement ...
Carlos Guestrin, Relu Patrascu, Dale Schuurmans
VISUALIZATION
1999
IEEE
14 years 2 months ago
Design and Implementation of an Immersive Geoscience Toolkit
Having a better way to represent and to interact with large geological models are topics of high interest in geoscience, and especially for oil and gas companies. We present in th...
Christophe Winkler, Fabien Bosquet, Xavier Cavin, ...
ICALP
2005
Springer
14 years 3 months ago
Password-Based Encryption Analyzed
Abstract. The use of passwords in security protocols is particularly delicate because of the possibility of off-line guessing attacks. We study password-based protocols in the cont...
Martín Abadi, Bogdan Warinschi