Sciweavers

506 search results - page 91 / 102
» Where Is the Value in a Program Verifier
Sort
View
IJSYSC
2000
67views more  IJSYSC 2000»
13 years 7 months ago
Incorporating prior knowledge in fuzzy model identification
This paper presents an algorithm for incorporating a priori knowledge into data-driven identification of dynamic fuzzy models of the Takagi-Sugeno type. Knowledge about the modell...
János Abonyi, Robert Babuska, Henk B. Verbr...
TIT
2011
193views more  TIT 2011»
13 years 2 months ago
Optimal Resource Allocation for MIMO Ad Hoc Cognitive Radio Networks
—Maximization of the weighted sum-rate of secondary users (SUs) possibly equipped with multiantenna transmitters and receivers is considered in the context of cognitive radio (CR...
Seung-Jun Kim, Georgios B. Giannakis
CIMCA
2008
IEEE
14 years 1 months ago
Tree Exploration for Bayesian RL Exploration
Research in reinforcement learning has produced algorithms for optimal decision making under uncertainty that fall within two main types. The first employs a Bayesian framework, ...
Christos Dimitrakakis
RSP
2005
IEEE
164views Control Systems» more  RSP 2005»
14 years 1 months ago
High Level Synthesis for Data-Driven Applications
Abstract— John von Neumann proposed his famous architecture in a context where hardware was very expensive and bulky. His goal was to maximize functionality with minimal hardware...
Etienne Bergeron, Xavier Saint-Mleux, Marc Feeley,...
ATAL
2006
Springer
13 years 11 months ago
Learning the task allocation game
The distributed task allocation problem occurs in domains like web services, the grid, and other distributed systems. In this problem, the system consists of servers and mediators...
Sherief Abdallah, Victor R. Lesser