Sciweavers

3571 search results - page 50 / 715
» On the Power of Imperfect Information
Sort
View
ICC
2009
IEEE
127views Communications» more  ICC 2009»
15 years 4 months ago
Security Games with Incomplete Information
—We study two-player security games which can be viewed as sequences of nonzero-sum matrix games where at each stage of the iterations the players make imperfect observations of ...
Kien C. Nguyen, Tansu Alpcan, Tamer Basar
COMPLEXITY
2007
116views more  COMPLEXITY 2007»
14 years 9 months ago
Life, information, entropy, and time: Vehicles for semantic inheritance
abstractions provides an additional supra-phenotypic vehicle for semantic inheritance, which supports the cultural heritages around which civilizations revolve. The following three...
Antony R. Crofts
ICCAD
1994
IEEE
144views Hardware» more  ICCAD 1994»
15 years 1 months ago
Power analysis of embedded software: a first step towards software power minimization
Embedded computer systems are characterized by the presence of a dedicated processor and the software that runs on it. Power constraints are increasingly becoming the critical com...
Vivek Tiwari, Sharad Malik, Andrew Wolfe
CDC
2008
IEEE
129views Control Systems» more  CDC 2008»
15 years 4 months ago
Distributed motion constraints for algebraic connectivity of robotic networks
— This paper studies connectivity maintenance of robotic networks that communicate at discrete times and move in continuous space. We propose a distributed algorithm that allows ...
Michael Schuresko, Jorge Cortés
SDM
2003
SIAM
174views Data Mining» more  SDM 2003»
14 years 11 months ago
STAMP: On Discovery of Statistically Important Pattern Repeats in Long Sequential Data
In this paper, we focus on mining periodic patterns allowing some degree of imperfection in the form of random replacement from a perfect periodic pattern. In InfoMiner+, we propo...
Jiong Yang, Wei Wang 0010, Philip S. Yu