83 Hits in 13.9 sec

Prioritized Unit Propagation with Periodic Resetting is (Almost) All You Need for Random SAT Solving [article]

Xujie Si, Yujia Li, Vinod Nair, Felix Gimeno
2019 arXiv   pre-print
We propose prioritized unit propagation with periodic resetting, which is a simple but surprisingly effective algorithm for solving random SAT instances that are meant to be hard.  ...  We share this observation in the hope that it helps the SAT community better understand the hardness of random instances used in competitions and inspire other interesting ideas on SAT solving.  ...  Algorithm 3 summarizes our main SAT solving algorithm, Prioritized Unit Propagation with PEriodic Resetting (PUPPER), which combines prioritized unit propagation and periodic resetting.  ... 
arXiv:1912.05906v1 fatcat:oi4i3id4cneitpmngevcqtmksy

Reinforcement Learning [chapter]

Ke-Lin Du, M. N. S. Swamy
2013 Neural Networks and Statistical Learning  
For example, one approach is based on the theory of partially-observable MDPs (POMDPs).  ...  The downside for the Bayesian POMDP approach is its computational expense and its strong reliance on complete environment models.  ...  The space of all possible tasks is thus a unit square, as shown in Figure 2 .2.  ... 
doi:10.1007/978-1-4471-5571-3_18 fatcat:l3xi3uyhtff35gai7qvvvedwbq

Reinforcement Learning [chapter]

Andrew G. Barto
1997 Neural Systems for Control  
For example, one approach is based on the theory of partially-observable MDPs (POMDPs).  ...  The downside for the Bayesian POMDP approach is its computational expense and its strong reliance on complete environment models.  ...  The space of all possible tasks is thus a unit square, as shown in Figure 2 .2.  ... 
doi:10.1016/b978-012526430-3/50003-9 fatcat:nwyl3dsnrbc75csknm6u34nyty

Visible Light-Assisted Soft-Chemistry Route to Silver Nanomaterials at Room Temperature

Yi Wu, Xin Liu, Zi Huang, Xiang Fei He, Xi Yang, Qing Li
2019 Key Engineering Materials  
AgNPs were characterized with powder X-ray diffraction (XRD) and scanning electron microscope (SEM). The result showed that the nanoparticles are spherical and cube.  ...  Silver nanoparticles (AgNPs) were synthesizd by a light-assisted liquid phase reduction method with sodium hypophosphite as a reducing agent. DTAB was used to perform as the surfactant.  ...  I encourage you to enjoy all opportunities the organizers have prepared for you and more.  ... 
doi:10.4028/ fatcat:xara5sxzf5fsvbib2dy6vrl7j4

Engineering Resilient Space Systems

John C. Day, Michel D. Ingham, Richard M. Murray, Leonard J. Reder, Brian C. Williams
2015 Insight  
The problem is when you have hundreds of monitors and related actions you never know what will happen if things interfere, etc. A persistent question is: "How do you validate it?"  ...  Erv Baumann uses the term collective redundancy to describe the idea that if you have multiple copies of physically separate units (e.g., a number of formation-flying UAVs or CubeSats), you can leverage  ...  CASPER is designed for embedded online applications whereas ASPEN is designed for offline use. c.  ... 
doi:10.1002/inst.12006 fatcat:y5j67eywl5edlc5xj5246aqomy

III Advanced Topics [chapter]

2016 Soft Computing Applications in Sensor Networks  
When all the nodes have served as CHs, the game resets to its initial condition. Nodes whose energy is depleted are excluded.  ...  The link between the unit of layer 1 and unit of layer 2 is associated with a links from layer 1 to layer 2.  ...  In V2V, information is shared among all vehicles in a range without need to commu nicate with an infrastructure.  ... 
doi:10.1201/9781315372020-13 fatcat:ze5voikcfbfi5lubz5t5oismua

Computer Networking [article]

Kurose Ross
2017 Zenodo  
Indeed, it's our aim in this book to provide you with a modern introduction to the dynamic field of computer networking, giving you the principles and practical insights you'll need to understand not only  ...  And if so, is it possible that it actually could be both interesting and fun to learn about computer networks? Fortunately, the answer to all of these questions is a resounding YES!  ...  Propagation Delay Once a bit is pushed into the link, it needs to propagate to router B. The time required to propagate from the beginning of the link to router B is the propagation delay.  ... 
doi:10.5281/zenodo.5599466 fatcat:roncomlhjrf7dafpacammhf6xq

Using complexity to protect elections

Piotr Faliszewski, Edith Hemaspaandra, Lane A. Hemaspaandra
2010 Communications of the ACM  
So you might argue that you don't need to know how many copies you need to keep your data safe for the long term, you just need to know how many you need to keep it safe for the next few years.  ...  Today's SAT solvers, which enjoy wide industrial usage, routinely solve SAT instances with over one million variables. How can a scary NP-complete problem be so easy? What is going on?  ...  So, the last thing you probably have on your mind is whether or not you are properly insured.  ... 
doi:10.1145/1839676.1839696 fatcat:hbqpm5boabe3jcpa4jcs7czf6y

Unsupervised Learning for Expressive Speech Synthesis

Igor Jauk
2018 IberSPEECH 2018  
Nowadays, especially with the upswing of neural networks, speech synthesis is almost totally data driven.  ...  The consequences are, first, it is very difficult to define labels which reliably identify expressive speech with all nuances.  ...  Acknowledgements First of all I would like to thank Antonio Bonafonte for his help, lead and patience, and for the opportunity to work and to develop this work in his group.  ... 
doi:10.21437/iberspeech.2018-38 dblp:conf/iberspeech/Jauk18 fatcat:6zogjdy3gjgslfbbgrqirjzsx4

Efficient Analysis and Synthesis of Complex Quantitative Systems [article]

Peter Gjøl Jensen
2018 PhD series, Technical Faculty of IT and Design, ˜Aalborg=ålborgœ University  
From toasters and to space-stations, computerized technology is pervasive in modern technology and society, therefore the need for truly correct, safe and optimal control algorithms is higher than ever  ...  Faellestraekket for mange af applikationsområderne er det tidskritiske aspekt. Airbags, pacemakers og trafiklys har alle tidsspecifikke krav, som aldrig bør overskrides.  ...  The third author is partially affiliated with FI MU, Brno, Czech Republic. Acknowledgements. This work is partially supported by the National Science Foundation of China Nos.  ... 
doi:10.5278/ fatcat:fq4x5hnl5rgdzdtolcimzbonxm

Functional Representation of Prototypes in LVQ and Relevance Learning [chapter]

Friedrich Melchert, Udo Seiffert, Michael Biehl
2016 Advances in Intelligent Systems and Computing  
The overall acceptance rate was 88% (63% for regular papers, 100% for compressed contributions and demonstration abstracts, and 91% for thesis abstracts).  ...  Held yearly, the objective of BNAIC is to promote and disseminate recent research developments in Artificial Intelligence within Belgium, Luxembourg and the Netherlands.  ...  This work was realized with the support from CNPq, National Council for Scientific and Technological Development -Brazil, through a scholarship which reference number is 235134/2014-7.  ... 
doi:10.1007/978-3-319-28518-4_28 fatcat:uwxvq6txmrba3ajulmblafgh2a

The YouTube effect: a paradigm shift in how musicians learn, teach and share?.pdf

Neil Garner
2017 Figshare  
Acknowledgements For my family and other animals.  ...  And in doing so, in peppering your search history from disparate and unconnected almost random searches you then get that stymie the predictivity of Web 3.0 and it's allied advertising!  ...  During the transition period there will be a large but never complete overlap between the problems that can be solved by the old and by the new paradigm.  ... 
doi:10.6084/m9.figshare.5593246.v1 fatcat:dvtwjca4vfbjpn2nztuukgwju4

Stuxnet and the Limits of Cyber Warfare

Jon R. Lindsay
2013 Security Studies  
Stuxnet suggests that considerable social and technical uncertainties associated with cyber operations may significantly blunt their revolutionary potential.  ...  The influential but largely untested Cyber Revolution thesis holds that the internet gives militarily weaker actors asymmetric advantages; that offense is becoming easier while defense is growing harder  ...  Acknowledgements I thank Erik Gartzke, Eugene Gholz, Brendan Green, Robert Giesler, Sean Lawson, Carrie Lee Lindsay, Joshua Rovner, and the anonymous reviewers for helpful comments and advice.  ... 
doi:10.1080/09636412.2013.816122 fatcat:bmbehx2dwfdrrix62antyjr6qu

An orchestration approach for unwanted Internet traffic identification

Eduardo Feitosa, Eduardo Souto, Djamel H. Sadok
2012 Computer Networks  
Almost all P2P applications do take a ride over this protocol. The explanation is simple. HTTP is normally released in almost all firewalls, ACL (Access Control List), and filters.  ...  Formally, is a sub-episode of , written as , as there exists a mapping such that for all and for all with and also .  ... 
doi:10.1016/j.comnet.2012.04.018 fatcat:2aeso6gfq5dmhixzfzpjo7jrwm

An investigation of possibilities and limitations of 'education borrowing' in Barbados and Trinidad and Tobago

Elaine Kayuet Lam
2010 Compare  
The history of Tobago is closely aligned with those of the Lesser Antilles as Tobago changed hands 22 times between the Dutch, French and the British (US Department of State, 2008b) -more than any other  ...  The following is a summary of the historical stages of development of the Caribbean. Al.  ...  be prioritized".  ... 
doi:10.1080/03057920903425697 fatcat:4rg5my7glzhmfpdbnmhyhjvmue
« Previous Showing results 1 — 15 out of 83 results