Sciweavers

2168 search results - page 188 / 434
» Using Approximation Hardness to Achieve Dependable Computati...
Sort
View
MP
2010
94views more  MP 2010»
15 years 2 months ago
MIR closures of polyhedral sets
We study the mixed-integer rounding (MIR) closures of polyhedral sets. The MIR closure of a polyhedral set is equal to its split closure and the associated separation problem is N...
Sanjeeb Dash, Oktay Günlük, Andrea Lodi
ICPR
2006
IEEE
16 years 5 months ago
Control Double Inverted Pendulum by Reinforcement Learning with Double CMAC Network
To accelerate the learning of reinforcement learning, many types of function approximation are used to represent state value. However function approximation reduces the accuracy o...
Siwei Luo, Yu Zheng, Ziang Lv
AAAI
2000
15 years 5 months ago
Towards Feasible Approach to Plan Checking under Probabilistic Uncertainty: Interval Methods
The main problem of planning is to find a sequence of actions that an agent must perform to achieve a given objective. An important part of planning is checking whether a given pl...
Raul Trejo, Vladik Kreinovich, Chitta Baral
GECCO
2009
Springer
193views Optimization» more  GECCO 2009»
15 years 9 months ago
Optimization of dynamic memory managers for embedded systems using grammatical evolution
New portable consumer embedded devices must execute multimedia applications (e.g., 3D games, video players and signal processing software, etc.) that demand extensive memory acces...
José L. Risco-Martín, David Atienza,...
ACMICEC
2008
ACM
195views ECommerce» more  ACMICEC 2008»
15 years 6 months ago
DRM domain authentication using electronic payment systems
This paper focuses on the problem of how to allow sharing of copyrighted content between a set of authorised devices and preventing unauthoried copying of content to other devices...
Imad M. Abbadi, Muntaha Alawneh