Sciweavers

11 search results - page 2 / 3
» Minimizing Minimality and Maximizing Utility: Analyzing Meth...
Sort
View
IH
2004
Springer
13 years 10 months ago
Information Hiding in Finite State Machine
In this paper, we consider how to hide information into finite state machine (FSM), one of the popular computation models. The key advantage of hiding information in FSM is that t...
Lin Yuan, Gang Qu
CEC
2010
IEEE
13 years 6 months ago
CHC and SA applied to wind energy optimization using real data
In this article we analyze different metaheuristic algorithms applied to wind farm optimization. The basic idea is to utilize CHC (a sort of GA) and Simulated Annealing to obtain a...
Martin Bilbao, Enrique Alba
VLDB
2004
ACM
134views Database» more  VLDB 2004»
13 years 10 months ago
A Privacy-Preserving Index for Range Queries
Database outsourcing is an emerging data management paradigm which has the potential to transform the IT operations of corporations. In this paper we address privacy threats in da...
Bijit Hore, Sharad Mehrotra, Gene Tsudik
RTSS
2003
IEEE
13 years 10 months ago
Data Caches in Multitasking Hard Real-Time Systems
Data caches are essential in modern processors, bridging the widening gap between main memory and processor speeds. However, they yield very complex performance models, which make...
Xavier Vera, Björn Lisper, Jingling Xue
TCOS
2010
13 years 5 days ago
Green Secure Processors: Towards Power-Efficient Secure Processor Design
With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the softwar...
Siddhartha Chhabra, Yan Solihin