Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








22,873 Hits in 2.4 sec

Interleaved Depth-First Search

Pedro Meseguer
1997 International Joint Conference on Artificial Intelligence  
In tree search, depth-first search (DFS) often uses ordering successor heuristics.  ...  To prevent this useless work, we present a new strategy called interleaved depthfirst search (IDFS), which searches depth-first several subtrees -called active-in parallel.  ...  In this sense, IDFS interleaves depth-first search on active subtrees.  ... 
dblp:conf/ijcai/Meseguer97 fatcat:qir7kt6vqbh7lpeftdxe6uy3za

Exploring Complicated Search Spaces with Interleaving-Free Sampling [article]

Yunjie Tian, Lingxi Xie, Jiemin Fang, Jianbin Jiao, Qixiang Ye, Qi Tian
2021 arXiv   pre-print
interleaved connections.  ...  the interleaved connections to emerge in any of them.  ...  It is worth noting that the depth of w/o IF is much smaller than w/ IF, because the interleaved connections pro- In this section, we test IF-NAS in two micro search duce serious interference  ... 
arXiv:2112.02488v1 fatcat:impwnx22snah3czqhqfbz6cvgu

The One Page Model Checker [article]

Jason E. Holt
2005 arXiv   pre-print
We show how standard IPC mechanisms can be used with the fork() system call to perform explicit state model checking on all interleavings of a multithreaded application.  ...  Search Algorithm Our algorithm for performing a depth first search on all possible execution interleavings of two threads t0 and t1 is as follows: • Base case: Let I be the initial partial interleaving  ...  Since our algorithm performs a depth first search on the possible thread interleavings, the second occurrance of a combined execution counter can only occur once all the remaining interleavings from that  ... 
arXiv:cs/0506084v1 fatcat:ppzmuqw2g5fobhm4c34axq6kyi

A low complexity algorithm of blind estimation of convolutional interleaver parameters

Lu Gan, Dan Li, ZongHui Liu, LiPing Li
2012 Science China Information Sciences  
The product of the depth and width of the interleaver is firstly determined by analyzing interleaved data stream.  ...  Thus the delay, the depth and width of the convolutional interleaver can be estimated by analyzing the deinterleaved data streams.  ...  We first estimate the product of the depth and width of the interleaver by analyzing the interleaved data stream.  ... 
doi:10.1007/s11432-012-4673-9 fatcat:ajcerye2u5e5ngvor37fvk5rsq

Heuristics for model checking Java programs

Alex Groce, Willem Visser
2004 International Journal on Software Tools for Technology Transfer (STTT)  
In this paper we present an array of heuristic model checking techniques for combating the state space explosion when searching for errors.  ...  Some techniques for dealing with the most crucial problem in model checking, the state space explosion problem, concentrate on the first of these goals.  ...  Search strategy Definition BFS A breadth-first search. DFS A depth-first search. (depth n) indicates that stack depth is limited to n. best Table 3 . 3 Search strategies.  ... 
doi:10.1007/s10009-003-0130-9 fatcat:azqzw44fezg6lfcee3zow4rr4e

23.2 A 1920×1080 30fps 611 mW five-view depth-estimation processor for light-field applications

Hong-Hui Chen, Chao-Tsung Huang, Sih-Sian Wu, Chia-Liang Hung, Tsung-Chuan Ma, Liang-Gee Chen
2015 2015 IEEE International Solid-State Circuits Conference - (ISSCC) Digest of Technical Papers  
Figure 23.2.4 shows the four-bank interleaving architecture, addressing two design issues of the BP engine. The first is the 8-cycle pipelined BPMUB.  ...  The first stage is for data cost generation, which measures the pixel difference between the central view and its surrounding views for each tested depth value.  ...  Figure 23.2.4 shows the four-bank interleaving architecture, addressing two design issues of the BP engine. The first is the 8-cycle pipelined BPMUB.  ... 
doi:10.1109/isscc.2015.7063106 dblp:conf/isscc/ChenHWHMC15 fatcat:nxfsod2xvbcahh4j2qpnsuedm4

Algorithm portfolios

Carla P. Gomes, Bart Selman
2001 Artificial Intelligence  
In particular, we will see how, in a portfolio setting, it can be advantageous to use a more "risk-seeking" strategy with a high variance in run time, such as a randomized depth-first search approach in  ...  One can take advantage of such differences by combining several algorithms into a portfolio, and running them in parallel or interleaving them on a single processor.  ...  Fig. 3 . 3 Cost profiles for a logistics planning problems for depth-first and best-bound search strategies. Fig. 4 . 4 Heavy-tailed behavior of depth-first search.  ... 
doi:10.1016/s0004-3702(00)00081-3 fatcat:mh7jxfvysrhvrgw4rixjoyxtsy

Dynamic Optimality—Almost

Erik D. Demaine, Dion Harmon, John Iacono, Mihai Ptraşcu
2007 SIAM journal on computing (Print)  
This is the first major progress on Sleator and Tarjan's dynamic optimality conjecture of 1985 that O(1)-competitive binary search trees exist. 1. Move the pointer to its left child. 2.  ...  We present an O(lg lg n)-competitive online binary search tree, improving upon the best previous (trivial) competitive ratio of O(lg n).  ...  To cut an augmented tree A at depth d, first observe that the nodes of depth greater than d form an interval of key space within A.  ... 
doi:10.1137/s0097539705447347 fatcat:73xzwxzk45fezh57ggjy5rebsq

Predicting Serializability Violations: SMT-Based Search vs. DPOR-Based Search [chapter]

Arnab Sinha, Sharad Malik, Chao Wang, Aarti Gupta
2012 Lecture Notes in Computer Science  
We also describe details of our DPOR-based explicit search and pruning, and present an experimental evaluation comparing the two search techniques.  ...  The exploration of the predictive model to check alternate interleavings of events in the execution was performed explicitly, based on stateless model checking using dynamic partial order reduction (DPOR  ...  It first provides details of an explicit search algorithm that explores possible interleavings using specialized heuristics in a DPOR based search. (This was not described in [29] ).  ... 
doi:10.1007/978-3-642-34188-5_11 fatcat:23aj4d2sjbfsbjkvfnq3ad5a3e

A Multi-Core Sphere Decoder VLSI Architecture for MIMO Communications

Chia-Hsiang Yang, Dejan Markovic
2008 IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference  
Previous work has focused on implementations based on K-best or depth-first search, limiting the BER performance or the search speed.  ...  This paper presents a scalable multi-core sphere decoder architecture that can combine the advantages of the K-best and depth-first search methods.  ...  Depth-First Algorithm The depth-first algorithm [2] [3] starts the search from the root of the tree, Fig. 2(a) , and explores as far as possible along each branch.  ... 
doi:10.1109/glocom.2008.ecp.633 dblp:conf/globecom/YangM08 fatcat:3uksnxp4b5an5oy2u6kzu4bpi4

Concurrent Operations in Extendible Hashing

Meichun Hsu, Wei-Pang Yang
1986 Very Large Data Bases Conference  
The algorithm is deadlock free and allows the search operations to proceed concurrently with insertion operations without having to acquire locks on the directory entries or the data pages.  ...  It is spurious to consider an interleaved schedule C correct if it results in a failure of a search operation (i.e., the search operation does not find the key it is looking for) while the search operation  ...  Search Algorithm The search operation on an extendible hash file consists of (1) applying the hash lunction to obtain a pseudo key, (2) examining the first q bits of the pseudo key to determine the directory  ... 
dblp:conf/vldb/HsuY86 fatcat:pkww6crbfvd2bokablaxhwxure

State space caching revisited [chapter]

Patrice Godefroid, Gerard J. Holzmann, Didier Pirottin
1993 Lecture Notes in Computer Science  
This makes for the first time state space caching a very efficient verification method.  ...  Indeed, almost all states in the state space of concurrent systems are typically reached several times during the search.  ...  Figure 4 compares the performances of Algorithm 1 (classical depth-first search) and Algorithm 2 (depth-first search with sleep sets) for various cache sizes.  ... 
doi:10.1007/3-540-56496-9_15 fatcat:waxk6qsd4vhpbhaf4szx6s6a7q

Heuristic Model Checking for Java Programs [chapter]

Alex Groce, Willem Visser
2002 Lecture Notes in Computer Science  
Note how the limited depth DFS searches find much longer counterexamples in each case.  ...  Other options include using the sum of two heuristics, limiting the size of the search queue 1 (sacrificing completeness for focused exploration), and using an A * search rather than the default best-first  ... 
doi:10.1007/3-540-46017-9_21 fatcat:brxkgjn6erdmlf6ccsdckduiqi

CONCURRIT

Tayfun Elmas, Jacob Burnim, George Necula, Koushik Sen
2013 Proceedings of the 34th ACM SIGPLAN conference on Programming language design and implementation - PLDI '13  
Further, the programmer can specify how these thread schedules should be searched to find a schedule that reproduces the bug.  ...  Oracle for depth-first search In our framework, we implement search by following a depth-first search (DFS) strategy.  ...  Different oracles, however, will differ in the order in which the interleavings are explored. gies, such as breadth-first and depth-first search.  ... 
doi:10.1145/2491956.2462162 dblp:conf/pldi/ElmasBNS13 fatcat:5a3rjabojfarfgz7mptxoyjn2q

CONCURRIT

Tayfun Elmas, Jacob Burnim, George Necula, Koushik Sen
2013 SIGPLAN notices  
Further, the programmer can specify how these thread schedules should be searched to find a schedule that reproduces the bug.  ...  Oracle for depth-first search In our framework, we implement search by following a depth-first search (DFS) strategy.  ...  Different oracles, however, will differ in the order in which the interleavings are explored. gies, such as breadth-first and depth-first search.  ... 
doi:10.1145/2499370.2462162 fatcat:iwrufg3nargpdd6dxcgled47q4
« Previous Showing results 1 — 15 out of 22,873 results