Sciweavers

12981 search results - page 2391 / 2597
» Model Checking (Abstract)
Sort
View
EOR
2006
79views more  EOR 2006»
15 years 3 months ago
Equilibrium constrained optimization problems
ABSTRACT. We consider equilibrium constrained optimization problems, which have a general formulation that encompasses well-known models such as mathematical programs with equilibr...
S. Ilker Birbil, Gemayqzel Bouza, J. B. G. Frenk, ...
IJPRAI
2008
144views more  IJPRAI 2008»
15 years 3 months ago
Unsupervised Learning of a Hierarchy of Topological Maps Using Omnidirectional Images
unsupervised construction of topological maps, which provide an abstraction of the environment in terms of visual aspects. An unsupervised clustering algorithm is used to represent...
Ales Stimec, Matjaz Jogan, Ales Leonardis
ISCA
2008
IEEE
143views Hardware» more  ISCA 2008»
15 years 3 months ago
TokenTM: Efficient Execution of Large Transactions with Hardware Transactional Memory
Current hardware transactional memory systems seek to simplify parallel programming, but assume that large transactions are rare, so it is acceptable to penalize their performance...
Jayaram Bobba, Neelam Goyal, Mark D. Hill, Michael...
CORR
2007
Springer
127views Education» more  CORR 2007»
15 years 3 months ago
Attribute Exploration of Discrete Temporal Transitions
Discrete temporal transitions occur in a variety of domains, but this work is mainly motivated by applications in molecular biology: explaining and analyzing observed transcriptome...
Johannes Wollbold
109
Voted
CORR
2007
Springer
70views Education» more  CORR 2007»
15 years 3 months ago
Secure Broadcasting
Abstract—We study a problem of broadcasting confidential messages to multiple receivers under an information-theoretic secrecy constraint. Two scenarios are considered: 1) all r...
Ashish Khisti, Aslan Tchamkerten, Gregory W. Worne...
« Prev « First page 2391 / 2597 Last » Next »