Sciweavers

9 search results - page 2 / 2
» Program Obfuscation Scheme Using Random Numbers to Complicat...
Sort
View
GECCO
2003
Springer
128views Optimization» more  GECCO 2003»
13 years 10 months ago
The Principle of Maximum Entropy-Based Two-Phase Optimization of Fuzzy Controller by Evolutionary Programming
In this paper, a two-phase evolutionary optimization scheme is proposed for obtaining optimal structure of fuzzy control rules and their associated weights, using evolutionary prog...
Chi-Ho Lee, Ming Yuchi, Hyun Myung, Jong-Hwan Kim
ISCC
2003
IEEE
153views Communications» more  ISCC 2003»
13 years 10 months ago
Fuzzy Explicit Marking for Congestion Control in Differentiated Services Networks
This paper presents a new active queue management scheme, Fuzzy Explicit Marking (FEM), implemented within the differentiated services (Diff-Serv) framework to provide congestion ...
Chrysostomos Chrysostomou, Andreas Pitsillides, Ge...
CDC
2009
IEEE
124views Control Systems» more  CDC 2009»
13 years 5 months ago
Inverse modeling for open boundary conditions in channel network
Abstract-- An inverse modeling problem for systems governed by first-order, hyperbolic partial differential equations subject to periodic forcing is investigated. The problem is de...
Qingfang Wu, Mohammad Rafiee, Andrew Tinka, Alexan...
VLSISP
2008
173views more  VLSISP 2008»
13 years 4 months ago
Fast Bit Gather, Bit Scatter and Bit Permutation Instructions for Commodity Microprocessors
Advanced bit manipulation operations are not efficiently supported by commodity word-oriented microprocessors. Programming tricks are typically devised to shorten the long sequence...
Yedidya Hilewitz, Ruby B. Lee