Sciweavers

13841 search results - page 2725 / 2769
» Algorithms and Constraint Programming
Sort
View
ISCA
2007
IEEE
167views Hardware» more  ISCA 2007»
15 years 6 months ago
New cache designs for thwarting software cache-based side channel attacks
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike physical side channel attacks that mostly target embedded cryptographic devices,...
Zhenghong Wang, Ruby B. Lee
AIME
2007
Springer
15 years 6 months ago
An Intelligent Aide for Interpreting a Patient's Dialysis Data Set
Many machines used in the modern hospital settings offer real time physiological monitoring. Haemodialysis machines combine a therapeutic treatment system integrated with sophistic...
Derek H. Sleeman, Nick Fluck, Elias Gyftodimos, La...
94
Voted
EMSOFT
2007
Springer
15 years 6 months ago
Optimal task placement to improve cache performance
Most recent embedded systems use caches to improve their average performance. Current timing analyses are able to compute safe timing guarantees for these systems, if tasks are ru...
Gernot Gebhard, Sebastian Altmeyer
101
Voted
EUROGP
2007
Springer
15 years 6 months ago
The Holland Broadcast Language and the Modeling of Biochemical Networks
Abstract. The Broadcast Language is a programming formalism devised by Holland in 1975, which aims at improving the efficiency of Genetic Algorithms (GAs) during long-term evolutio...
James Decraene, George G. Mitchell, Barry McMullin...
GECCO
2007
Springer
181views Optimization» more  GECCO 2007»
15 years 6 months ago
ACOhg: dealing with huge graphs
Ant Colony Optimization (ACO) has been successfully applied to those combinatorial optimization problems which can be translated into a graph exploration. Artificial ants build s...
Enrique Alba, J. Francisco Chicano
« Prev « First page 2725 / 2769 Last » Next »