Sciweavers

1585 search results - page 279 / 317
» Automatically optimizing secure computation
Sort
View
GECCO
2007
Springer
179views Optimization» more  GECCO 2007»
15 years 6 months ago
A destructive evolutionary process: a pilot implementation
This paper describes the application of evolutionary search to the problem of Flash memory wear-out. The operating parameters of Flash memory are notoriously difficult to determin...
Joe Sullivan, Conor Ryan
WORDS
2002
IEEE
15 years 4 months ago
Meta-Programming Techniques for Distributed Real-time and Embedded Systems
Commercial off-the-shelf (COTS) middleware increasingly offers not only functional support for standard interfaces, but also the ability to optimize their resource consumption pat...
Joseph K. Cross, Douglas C. Schmidt
GECCO
2006
Springer
201views Optimization» more  GECCO 2006»
15 years 3 months ago
Selective self-adaptive approach to ant system for solving unit commitment problem
This paper presents a novel approach to solve the constrained unit commitment problem using Selective Self-Adaptive Ant System (SSAS) for improving search performance by automatic...
Songsak Chusanapiputt, Dulyatat Nualhong, Sujate J...
FM
2008
Springer
152views Formal Methods» more  FM 2008»
15 years 1 months ago
Constraint Prioritization for Efficient Analysis of Declarative Models
The declarative modeling language Alloy and its automatic analyzer provide an effective tool-set for building designs of systems and checking their properties. The Alloy Analyzer p...
Engin Uzuncaova, Sarfraz Khurshid
TC
2008
14 years 11 months ago
Accurate, Pre-RTL Temperature-Aware Design Using a Parameterized, Geometric Thermal Model
Abstract-- Preventing silicon chips from negative, even disastrous thermal hazards has become increasingly challenging these days; considering thermal effects early in the design c...
Wei Huang, Karthik Sankaranarayanan, Kevin Skadron...