Sciweavers

9405 search results - page 1734 / 1881
» Computing a Model of Set Theory
Sort
View
IISWC
2006
IEEE
15 years 10 months ago
Performance Cloning: A Technique for Disseminating Proprietary Applications as Benchmarks
Many embedded real world applications are intellectual property, and vendors hesitate to share these proprietary applications with computer architects and designers. This poses a ...
Ajay Joshi, Lieven Eeckhout, Robert H. Bell Jr., L...
ISPASS
2005
IEEE
15 years 9 months ago
Simulation Differences Between Academia and Industry: A Branch Prediction Case Study
Computer architecture research in academia and industry is heavily reliant on simulation studies. While microprocessor companies have the resources to develop highly detailed simu...
Gabriel H. Loh
VISUALIZATION
2005
IEEE
15 years 9 months ago
Opening the Black Box - Data Driven Visualization of Neural Network
Arti cial neural networks are computer software or hardware models inspired by the structure and behavior of neurons in the human nervous system. As a powerful learning tool, incr...
Fan-Yin Tzeng, Kwan-Liu Ma
147
Voted
ATAL
2005
Springer
15 years 9 months ago
A polynomial algorithm for decentralized Markov decision processes with temporal constraints
One of the difficulties to adapt MDPs for the control of cooperative multi-agent systems, is the complexity issued from Decentralized MDPs. Moreover, existing approaches can not ...
Aurélie Beynier, Abdel-Illah Mouaddib
ATAL
2005
Springer
15 years 9 months ago
Task delegation using experience-based multi-dimensional trust
Cooperation among autonomous agents involves an inherent degree of uncertainty. Agents determine for themselves when to initiate cooperation or to assist others, when to rescind c...
Nathan Griffiths
« Prev « First page 1734 / 1881 Last » Next »