Sciweavers

2652 search results - page 270 / 531
» Privacy-preserving linear programming
Sort
View
112
Voted
HICSS
2009
IEEE
127views Biometrics» more  HICSS 2009»
15 years 10 months ago
An Optimization Model for Tactical Planning of Wood Procurement
This paper presents a new LP (Linear Programming) model to solve a tactical wood procurement and harvesting problem. This optimization problem occurs in several wood supply chains...
Anders Skjäl, Kaj-Mikael Björk, Jenny &O...
DATE
2009
IEEE
133views Hardware» more  DATE 2009»
15 years 10 months ago
Pipelined data parallel task mapping/scheduling technique for MPSoC
—In this paper, we propose a multi-task mapping/scheduling technique for heterogeneous and scalable MPSoC. To utilize the large number of cores embedded in MPSoC, the proposed te...
Hoeseok Yang, Soonhoi Ha
126
Voted
ICRA
2009
IEEE
143views Robotics» more  ICRA 2009»
15 years 10 months ago
Least absolute policy iteration for robust value function approximation
Abstract— Least-squares policy iteration is a useful reinforcement learning method in robotics due to its computational efficiency. However, it tends to be sensitive to outliers...
Masashi Sugiyama, Hirotaka Hachiya, Hisashi Kashim...
105
Voted
CSL
2009
Springer
15 years 10 months ago
Focalisation and Classical Realisability
We develop a polarised variant of Curien and Herbelin’s ¯λµ˜µ calculus suitable for sequent calculi that admit a focalising cut elimination (i.e. whose proofs are focalised ...
Guillaume Munch-Maccagnoni
105
Voted
ETFA
2008
IEEE
15 years 10 months ago
From monotone inequalities to Model Predictive Control
The dater equalities constitute a well-known tool which allows the description of Timed Event Graphs in the field of (max, +) algebra. This paper gives an equivalent model in the...
Abdelhak Guezzi, Philippe Declerck, Jean-Louis Boi...