Sciweavers

14190 search results - page 2518 / 2838
» computing 2008
Sort
View
COCO
2009
Springer
128views Algorithms» more  COCO 2009»
15 years 11 months ago
An Almost Optimal Rank Bound for Depth-3 Identities
—We show that the rank of a depth-3 circuit (over any field) that is simple, minimal and zero is at most O(k3 log d). The previous best rank bound known was 2O(k2 ) (log d)k−2...
Nitin Saxena, C. Seshadhri
CRYPTO
2009
Springer
109views Cryptology» more  CRYPTO 2009»
15 years 11 months ago
Randomizable Proofs and Delegatable Anonymous Credentials
We construct an efficient delegatable anonymous credentials system. Users can anonymously and unlinkably obtain credentials from any authority, delegate their credentials to other ...
Mira Belenkiy, Jan Camenisch, Melissa Chase, Marku...
FSTTCS
2009
Springer
15 years 11 months ago
Iterative Methods in Combinatorial Optimization
We describe a simple iterative method for proving a variety of results in combinatorial optimization. It is inspired by Jain’s iterative rounding method (FOCS 1998) for designing...
R. Ravi
GECCO
2009
Springer
135views Optimization» more  GECCO 2009»
15 years 11 months ago
Neuroevolutionary reinforcement learning for generalized helicopter control
Helicopter hovering is an important challenge problem in the field of reinforcement learning. This paper considers several neuroevolutionary approaches to discovering robust cont...
Rogier Koppejan, Shimon Whiteson
SAT
2009
Springer
132views Hardware» more  SAT 2009»
15 years 11 months ago
Relaxed DPLL Search for MaxSAT
We propose a new incomplete algorithm for the Maximum Satisfiability (MaxSAT) problem on unweighted Boolean formulas, focused specifically on instances for which proving unsatis...
Lukas Kroc, Ashish Sabharwal, Bart Selman
« Prev « First page 2518 / 2838 Last » Next »