Sciweavers

107 search results - page 4 / 22
» Some Applications of Bounds for Designs to the Cryptography
Sort
View
ICML
2010
IEEE
13 years 7 months ago
Gaussian Process Optimization in the Bandit Setting: No Regret and Experimental Design
Many applications require optimizing an unknown, noisy function that is expensive to evaluate. We formalize this task as a multiarmed bandit problem, where the payoff function is ...
Niranjan Srinivas, Andreas Krause, Sham Kakade, Ma...
DSD
2007
IEEE
136views Hardware» more  DSD 2007»
13 years 6 months ago
Error-Aware Design
The universal underlying assumption made today is that Systems on chip must maintain 100% correctness regardless of the application. This work advocates the concept that some appl...
Fadi J. Kurdahi, Ahmed M. Eltawil, Amin Khajeh Dja...
AISB
1997
Springer
13 years 10 months ago
Modelling Bounded Rationality Using Evolutionary Techniques
A technique for the credible modelling of economic agents with bounded rationality based on the evolutionary techniques is described. The genetic programming paradigm is most suite...
Bruce Edmonds, Scott Moss
ISQED
2005
IEEE
98views Hardware» more  ISQED 2005»
14 years 6 days ago
Wire Planning with Bounded Over-the-Block Wires
Hierarchical approach greatly facilitates large-scale chip design by hiding distracting details in low-level objects. However, the lowlevel designs have to have a global view of h...
Hua Xiang, I-Min Liu, Martin D. F. Wong
ENTCS
2007
131views more  ENTCS 2007»
13 years 6 months ago
Secure Node Discovery in Ad-hoc Networks and Applications
Designing secure protocols over ad-hoc networks has proved to be a very challenging task, due to various features of such networks, such as partial connectivity, node mobility, an...
Giovanni Di Crescenzo