Sciweavers

534 search results - page 99 / 107
» Proving Termination of Rewrite Systems Using Bounds
Sort
View
ICML
2009
IEEE
14 years 9 months ago
Near-Bayesian exploration in polynomial time
We consider the exploration/exploitation problem in reinforcement learning (RL). The Bayesian approach to model-based RL offers an elegant solution to this problem, by considering...
J. Zico Kolter, Andrew Y. Ng
IROS
2007
IEEE
149views Robotics» more  IROS 2007»
14 years 3 months ago
A decentralized planner that guarantees the safety of communicating vehicles with complex dynamics that replan online
— This paper considers the problem of coordinating multiple vehicles with kinodynamic constraints that operate in the same partially-known environment. The vehicles are able to c...
Kostas E. Bekris, Konstantinos I. Tsianos, Lydia E...
SIGMETRICS
2005
ACM
163views Hardware» more  SIGMETRICS 2005»
14 years 2 months ago
Smooth switching problem in buffered crossbar switches
Scalability considerations drive the switch fabric design to evolve from output queueing to input queueing and further to combined input and crosspoint queueing (CICQ). However, f...
Simin He, Shutao Sun, Wei Zhao, Yanfeng Zheng, Wen...
WADS
2005
Springer
132views Algorithms» more  WADS 2005»
14 years 2 months ago
k-Link Shortest Paths in Weighted Subdivisions
We study the shortest path problem in weighted polygonal subdivisions of the plane, with the additional constraint of an upper bound, k, on the number of links (segments) in the pa...
Ovidiu Daescu, Joseph S. B. Mitchell, Simeon C. Nt...
ATAL
2004
Springer
14 years 2 months ago
RDS: Remote Distributed Scheme for Protecting Mobile Agents
As of today no solely software-based solution that a priori protects the computation of any mobile code and/or mobile agent was presented. Furthermore, Algesheimer et al. [1], arg...
Asnat Dadon-Elichai