Sciweavers

3898 search results - page 211 / 780
» On the Bit Extraction Problem
Sort
View
ARC
2010
Springer
186views Hardware» more  ARC 2010»
15 years 6 months ago
Application-Specific Signatures for Transactional Memory in Soft Processors
As reconfigurable computing hardware and in particular FPGA-based systems-on-chip comprise an increasing number of processor and accelerator cores, supporting sharing and synchroni...
Martin Labrecque, Mark Jeffrey, J. Gregory Steffan
COLT
2006
Springer
15 years 5 months ago
Can Entropic Regularization Be Replaced by Squared Euclidean Distance Plus Additional Linear Constraints
There are two main families of on-line algorithms depending on whether a relative entropy or a squared Euclidean distance is used as a regularizer. The difference between the two f...
Manfred K. Warmuth
VCIP
2001
159views Communications» more  VCIP 2001»
15 years 4 months ago
Embedded-to-lossless coding of motion-compensated prediction residuals in lossless video coding
Lossless video coding is useful in applications where no loss of information or visual quality is tolerable. In embedded to lossless coding an encoded video stream can be decoded ...
G. Charith K. Abhayaratne, Donald M. Monro
GECCO
2008
Springer
131views Optimization» more  GECCO 2008»
15 years 4 months ago
Rigorous analyses of fitness-proportional selection for optimizing linear functions
Rigorous runtime analyses of evolutionary algorithms (EAs) mainly investigate algorithms that use elitist selection methods. Two algorithms commonly studied are Randomized Local S...
Edda Happ, Daniel Johannsen, Christian Klein, Fran...
CGF
2007
145views more  CGF 2007»
15 years 3 months ago
Bitmask Soft Shadows
Recently, several real-time soft shadow algorithms have been introduced which all compute a single shadow map and use its texels to obtain a discrete scene representation. The res...
Michael Schwarz, Marc Stamminger