Search Results - Theory of computation Models of computation Interactive computation
-
1
Asynchronous Template Games and the Gray Tensor Product of 2-Categories
Published: IEEE 29.06.2021Published in Proceedings of the 36th Annual ACM/IEEE Symposium on Logic in Computer Science (29.06.2021)“…In his recent and exploratory work on template games and linear logic, Melliès defines sequential and concurrent games as categories with positions as objects…”
Get full text
Conference Proceeding -
2
Dynamic Algorithm Selection for SMT
ISSN: 2643-1572Published: ACM 01.09.2020Published in 2020 35th IEEE/ACM International Conference on Automated Software Engineering (ASE) (01.09.2020)“…We describe an online approach to SMT solver selection using nearest neighbor classification and runtime estimation. We implement and evaluate our approach…”
Get full text
Conference Proceeding -
3
Online scheduling for multi-core shared reconfigurable fabric
ISBN: 3981080181, 9783981080186Published: San Jose, CA, USA EDA Consortium 12.03.2012Published in Proceedings of the Conference on Design, Automation and Test in Europe (12.03.2012)“…Processor customization in the form of application-specific instructions has become a popular choice to meet the increasing performance demands of embedded…”
Get full text
Conference Proceeding -
4
Estimating Post-Synaptic Effects for Online Training of Feed-Forward SNNs
Published: IEEE 30.07.2024Published in 2024 International Conference on Neuromorphic Systems (ICONS) (30.07.2024)“…Facilitating online learning in spiking neural networks (SNNs) is a key step in developing event-based models that can adapt to changing environments and learn from continuous data streams in real-time…”
Get full text
Conference Proceeding -
5
Scenario Based Optimization: A Framework for Statically Enabling Online Optimizations
ISBN: 9780769535760, 0769535763Published: Washington, DC, USA IEEE Computer Society 22.03.2009Published in Code Generation and Optimization, Proceedings (22.03.2009)“…Online optimization allows the continuous restructuring and adaptation of an executing application using live information about its execution environment. The…”
Get full text
Conference Proceeding -
6
On-line scheduling of target sensitive periodic tasks with the gravitational task model
ISBN: 3981080181, 9783981080186Published: San Jose, CA, USA EDA Consortium 12.03.2012Published in Proceedings of the Conference on Design, Automation and Test in Europe (12.03.2012)“… In the gravitational task model, a task can express a target point, and the utility decay as a function of the deviation from this point…”
Get full text
Conference Proceeding -
7
Online Algorithms for Location-Aware Task Offloading in Two-Tiered Mobile Cloud Environments
Published: IEEE 01.12.2014Published in Proceedings of the 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing (01.12.2014)“…Mobile Cloud Computing (MCC) is emerging as a main ubiquitous computing platform which enables to leverage the resource limitations of mobile devices and wireless networks by offloading data-intensive computation tasks…”
Get full text
Conference Proceeding -
8
Quasi-Static Voltage Scaling for Energy Minimization with Time Constraints
ISBN: 9780769522883, 0769522882ISSN: 1530-1591Published: Washington, DC, USA IEEE Computer Society 07.03.2005Published in Design, Automation and Test in Europe (07.03.2005)“…Supply voltage scaling and adaptive body-biasing are important techniques that help to reduce the energy dissipation of embedded systems. This is achieved by…”
Get full text
Conference Proceeding -
9
Understanding Privacy-Control Arrangements Based on a Theory of Interactive Computation in B2C Service Models
ISSN: 1530-1605, 1530-1605Published: IEEE 01.01.2016Published in 2016 49th Hawaii International Conference on System Sciences (HICSS) (01.01.2016)“… However, the dynamics of dominant service models in relation to privacy-control arrangements between corporations and consumers are not well understood…”
Get full text
Conference Proceeding Journal Article -
10
Interactive Secure Function Computation
ISSN: 0018-9448, 1557-9654Published: New York IEEE 01.09.2020Published in IEEE transactions on information theory (01.09.2020)“…We consider interactive computation of randomized functions between two users with the following privacy requirement…”
Get full text
Journal Article -
11
Finite Model Theory of the Triguarded Fragment and Related Logics
Published: IEEE 29.06.2021Published in Proceedings of the 36th Annual ACM/IEEE Symposium on Logic in Computer Science (29.06.2021)“… We show that the TGF has the finite model property (providing a tight doubly exponential bound on the model size…”
Get full text
Conference Proceeding -
12
Evolutionary Computation: Theories, Techniques, and Applications
ISBN: 3725821232, 9783725821235, 9783725821242, 3725821240Published: Basel MDPI - Multidisciplinary Digital Publishing Institute 2024“…Evolutionary computation offers powerful problem-solving methodologies inspired by models of natural genetics and evolutionary processes…”
Get full text
eBook -
13
On-line Coordination: Event Interaction and State Communication between Cooperative Agents
ISBN: 0769538010, 9780769538013Published: Washington, DC, USA IEEE Computer Society 15.09.2009Published in Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 02 (15.09.2009)“…This paper addresses a novel coordination problem for distributed agents in a discrete-event setting. We introduce and study a predicate coordination problem…”
Get full text
Conference Proceeding -
14
Interactive Computation and Artificial Epistemologies
ISSN: 0263-2764, 1460-3616Published: London, England SAGE Publications 01.12.2021Published in Theory, culture & society (01.12.2021)“… and the biocentric speciation of thought. The article draws on Sylvia Wynter’s discussion of the sociogenic principle to argue that both neurocognitive and formal models…”
Get full text
Journal Article -
15
Tank War Using Online Reinforcement Learning
ISBN: 0769538010, 9780769538013Published: Washington, DC, USA IEEE Computer Society 15.09.2009Published in Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 02 (15.09.2009)“…Real-Time Strategy(RTS) games provide a challenging platform to implement online reinforcement learning(RL) techniques in a real application. Computer as one…”
Get full text
Conference Proceeding -
16
Online task-scheduling for fault-tolerant low-energy real-time systems
ISBN: 1595933891, 9781595933898ISSN: 1092-3152Published: 05.11.2006Published in International Conference on Computer Aided Design: Proceedings of the 2006 IEEE/ACM international conference on Computer-aided design : San Jose, California; 05-09 Nov. 2006 (05.11.2006)“…In this paper we investigate fault tolerance and Dynamic Voltage Scaling (DVS) in hard real time systems. We present two low-complexity fault-aware scheduling…”
Get full text
Conference Proceeding -
17
Zero-one laws for provability logic: Axiomatizing validity in almost all models and almost all frames
Published: IEEE 29.06.2021Published in Proceedings of the 36th Annual ACM/IEEE Symposium on Logic in Computer Science (29.06.2021)“…: As the number of elements of finite models increases, every formula holds either in almost all or in almost no models of that size…”
Get full text
Conference Proceeding -
18
Categorical models of Linear Logic with fixed points of formulas
Published: IEEE 29.06.2021Published in Proceedings of the 36th Annual ACM/IEEE Symposium on Logic in Computer Science (29.06.2021)“…) and relations preserving it, least and greatest fixed points have distinct interpretations. This latter model shows…”
Get full text
Conference Proceeding -
19
A Hybrid Architecture for Interactive Verifiable Computation
ISBN: 9781467361668, 1467361666ISSN: 1081-6011Published: IEEE 01.05.2013Published in 2013 IEEE Symposium on Security and Privacy (01.05.2013)“…We consider interactive, proof-based verifiable computation: how can a client machine specify a computation to a server, receive an answer, and then engage…”
Get full text
Conference Proceeding -
20
Secure Outsourced Matrix Computation and Application to Neural Networks
ISSN: 1543-7221, 1543-7221Published: United States 01.10.2018Published in Proceedings of the ... ACM Conference on Computer and Communications Security (01.10.2018)“… Comparing to secure Multi-Party Computation (MPC), HE has advantages in supporting non-interactive operations and saving on communication costs…”
Get more information
Journal Article

