Sciweavers

4911 search results - page 834 / 983
» Tree dependence analysis
Sort
View
APPROX
2008
Springer
71views Algorithms» more  APPROX 2008»
14 years 22 days ago
Tight Bounds for Hashing Block Sources
It is known that if a 2-universal hash function H is applied to elements of a block source (X1, . . . , XT ), where each item Xi has enough min-entropy conditioned on the previous...
Kai-Min Chung, Salil P. Vadhan
ASPDAC
2008
ACM
174views Hardware» more  ASPDAC 2008»
14 years 22 days ago
Chebyshev Affine Arithmetic based parametric yield prediction under limited descriptions of uncertainty
In modern circuit design, it is difficult to provide reliable parametric yield prediction since the real distribution of process data is hard to measure. Most existing approaches ...
Jin Sun, Yue Huang, Jun Li, Janet Meiling Wang
ATAL
2008
Springer
14 years 22 days ago
Simulation of individual spontaneous reactive behavior
The context of this work is the search for realism and believability of Virtual Humans. Our contribution to achieve this goal is to enable Virtual Humans (VH) to react to spontane...
Alejandra García-Rojas, Mario Gutiér...
ATAL
2008
Springer
14 years 22 days ago
Coalitional skill games
We consider Coalitional Skill Games (CSGs), a simple model of cooperation among agents. This is a restricted form of coalitional games, where each agent has a set of skills that a...
Yoram Bachrach, Jeffrey S. Rosenschein
AUTONOMICS
2008
ACM
14 years 22 days ago
On modeling of self-organizing systems
A goal of computing and networking systems is to limit administrative requirements for users and operators. A technical systems should be able to configure itself as much as possi...
Richard Holzer, Hermann de Meer