Sciweavers

1207 search results - page 150 / 242
» Towards optimal k-anonymization
Sort
View
ISLPED
1996
ACM
102views Hardware» more  ISLPED 1996»
14 years 1 months ago
High-level power estimation and the area complexity of Boolean functions
Estimation of the area complexity of a Boolean function from its functional description is an important step towards a power estimation capability at the register transfer level (...
Mahadevamurty Nemani, Farid N. Najm
IFIP
1993
Springer
14 years 1 months ago
Repositories for Software Reuse: The Software Information Base
Repositories play a pivotal role in an integrated reuse- based application development environment. Reusing software components implies their persistent storage and maintenance, a...
Panos Constantopoulos, Martin Doerr, Yannis Vassil...
KR
1994
Springer
14 years 1 months ago
Risk-Sensitive Planning with Probabilistic Decision Graphs
Probabilistic AI planning methods that minimize expected execution cost have a neutral attitude towards risk. We demonstrate how one can transform planning problems for risk-sensi...
Sven Koenig, Reid G. Simmons
SIGGRAPH
1994
ACM
14 years 1 months ago
Evolving virtual creatures
This paper describes a novel system for creating virtual creatures that move and behave in simulated three-dimensional physical worlds. The morphologies of creatures and the neura...
Karl Sims
CEC
2009
IEEE
14 years 1 months ago
Reverse-engineering of artificially evolved controllers for swarms of robots
It is generally challenging to design decentralized controllers for swarms of robots because there is often no obvious relation between the individual robot behaviors and the final...
Sabine Hauert, Jean-Christophe Zufferey, Dario Flo...