Sciweavers

2976 search results - page 494 / 596
» On the bounded integer programming
Sort
View
RV
2010
Springer
171views Hardware» more  RV 2010»
15 years 1 months ago
Runtime Verification for Software Transactional Memories
Software transactional memories (STMs) promise simple and efficient concurrent programming. Several correctness properties have been proposed for STMs. Based on a bounded conflict ...
Vasu Singh
ENTCS
2010
101views more  ENTCS 2010»
15 years 21 days ago
Strengthening the Zipper
The zipper is a well known design pattern for providing a cursor-like interface to a data structure. However, the classic treatise by Huet only scratches the surface of some of it...
Tristan O. R. Allwood, Susan Eisenbach
TCIAIG
2010
14 years 10 months ago
Combining UCT and Nested Monte Carlo Search for Single-Player General Game Playing
Monte-Carlo tree search has recently been very successful for game playing particularly for games where the evaluation of a state is difficult to compute, such as Go or General Gam...
Jean Méhat, Tristan Cazenave
ICASSP
2011
IEEE
14 years 7 months ago
Design of UEP-based MSE-minimizing rateless codes for source-channel coding
This paper proposes a method to optimize the performance of tandem source–channel coding with respect to the mean-squared error by exploiting the unequal error protection coding...
Amirpasha Shirazinia, Lei Bao, Mikael Skoglund
117
Voted
ICASSP
2011
IEEE
14 years 7 months ago
Error-entropy based channel state estimation of spatially correlated MIMO-OFDM
—This paper deals with optimized training sequences to estimate multiple-input multiple-output orthogonal frequencydivision multiplexing (MIMO-OFDM) channel states in the presenc...
Hoang Duong Tuan, Ha Hoang Kha, Ha H. Nguyen