Sciweavers

1243 search results - page 180 / 249
» Complexity reduction of C-Algorithm
Sort
View
GLVLSI
2009
IEEE
122views VLSI» more  GLVLSI 2009»
15 years 8 months ago
Enhancing SAT-based sequential depth computation by pruning search space
The sequential depth determines the completeness of bounded model checking in design verification. Recently, a SATbased method is proposed to compute the sequential depth of a de...
Yung-Chih Chen, Chun-Yao Wang
ICASSP
2009
IEEE
15 years 8 months ago
An efficient and robust method for detecting copy-move forgery
Copy-move forgery is a specific type of image tampering, where a part of the image is copied and pasted on another part of the same image. In this paper, we propose a new approac...
Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon
ICDAR
2009
IEEE
15 years 8 months ago
Impact of Alphabet Knowledge on Online Writer Identification
Character prototype approaches for writer identification produces a consistent set of templates that are used to model the handwriting styles of writers, thereby allowing high acc...
Guo Xian Tan, Christian Viard-Gaudin, Alex C. Kot
ALDT
2009
Springer
142views Algorithms» more  ALDT 2009»
15 years 8 months ago
Finding Best k Policies
Abstract. An optimal probabilistic-planning algorithm solves a problem, usually modeled by a Markov decision process, by finding its optimal policy. In this paper, we study the k ...
Peng Dai, Judy Goldsmith
ATAL
2009
Springer
15 years 8 months ago
Adversarial search with procedural knowledge heuristic
We introduce an adversarial planning algorithm based on game tree search, which is applicable in large-scale multiplayer domains. In order to tackle the scalability issues of game...
Viliam Lisý, Branislav Bosanský, Mic...