Sciweavers

267 search results - page 31 / 54
» Efficient and decentralized computation of approximate globa...
Sort
View
CORR
2010
Springer
175views Education» more  CORR 2010»
14 years 12 months ago
Detecting Security threats in the Router using Computational Intelligence
Information security is an issue of global concern. As the Internet is delivering great convenience and benefits to the modern society, the rapidly increasing connectivity and acc...
J. Visumathi, K. L. Shunmuganathan
CASES
2003
ACM
15 years 3 months ago
A hierarchical approach for energy efficient application design using heterogeneous embedded systems
Several features such as reconfiguration, voltage and frequency scaling, low-power operating states, duty-cycling, etc. are exploited for latency and energy efficient application ...
Sumit Mohanty, Viktor K. Prasanna
AAAI
1998
15 years 1 months ago
Solving Very Large Weakly Coupled Markov Decision Processes
We present a technique for computing approximately optimal solutions to stochastic resource allocation problems modeled as Markov decision processes (MDPs). We exploit two key pro...
Nicolas Meuleau, Milos Hauskrecht, Kee-Eung Kim, L...
ECCV
2008
Springer
16 years 1 months ago
Object Detection from Large-Scale 3D Datasets Using Bottom-Up and Top-Down Descriptors
We propose an approach for detecting objects in large-scale range datasets that combines bottom-up and top-down processes. In the bottom-up stage, fast-to-compute local descriptors...
Alexander Patterson, Philippos Mordohai, Kostas Da...
ASPDAC
2007
ACM
89views Hardware» more  ASPDAC 2007»
15 years 3 months ago
Trace Compaction using SAT-based Reachability Analysis
In today's designs, when functional verification fails, engineers perform debugging using the provided error traces. Reducing the length of error traces can help the debugging...
Sean Safarpour, Andreas G. Veneris, Hratch Mangass...