Sciweavers

7129 search results - page 1060 / 1426
» Approximation Algorithms for Treewidth
Sort
View
ATAL
2008
Springer
15 years 6 months ago
Sequential decision making with untrustworthy service providers
In this paper, we deal with the sequential decision making problem of agents operating in computational economies, where there is uncertainty regarding the trustworthiness of serv...
W. T. Luke Teacy, Georgios Chalkiadakis, Alex Roge...
ATAL
2008
Springer
15 years 6 months ago
Nonuniform bribery
We study the concept of bribery in the situation where voters are willing to change their votes as we ask them, but where their prices depend on the nature of the change we reques...
Piotr Faliszewski
CC
2008
Springer
138views System Software» more  CC 2008»
15 years 6 months ago
Improved Memory-Access Analysis for x86 Executables
Over the last seven years, we have developed static-analysis methods to recover a good approximation to the variables and dynamically allocated memory objects of a stripped executa...
Thomas W. Reps, Gogul Balakrishnan
CEC
2007
IEEE
15 years 5 months ago
Fitness inheritance in evolutionary and multi-objective high-level synthesis
Abstract—The high-level synthesis process allows the automatic design and implementation of digital circuits starting from a behavioral description. Evolutionary algorithms are v...
Christian Pilato, Gianluca Palermo, Antonino Tumeo...
DCOSS
2008
Springer
15 years 5 months ago
Frugal Sensor Assignment
When a sensor network is deployed in the field it is typically required to support multiple simultaneous missions, which may start and finish at different times. Schemes that match...
Matthew P. Johnson, Hosam Rowaihy, Diego Pizzocaro...
« Prev « First page 1060 / 1426 Last » Next »