Sciweavers

1791 search results - page 99 / 359
» Behavioral Operations
Sort
View
GECCO
2005
Springer
109views Optimization» more  GECCO 2005»
15 years 8 months ago
Investigations in meta-GAs: panaceas or pipe dreams?
A meta-GA (GA within a GA) is used to investigate evolving the parameter settings of genetic operators for genetic and evolutionary algorithms (GEA) in the hope of creating a self...
Jeff Clune, Sherri Goings, Bill Punch, Eric Goodma...
VLSID
2007
IEEE
154views VLSI» more  VLSID 2007»
16 years 3 months ago
Application Specific Datapath Extension with Distributed I/O Functional Units
Performance of an application can be improved through augmenting the processor with Application specific Functional Units (AFUs). Usually a cluster of operations identified from th...
Nagaraju Pothineni, Anshul Kumar, Kolin Paul
GECCO
2007
Springer
191views Optimization» more  GECCO 2007»
15 years 9 months ago
Particle swarm guided evolution strategy
Evolution strategy (ES) and particle swarm optimization (PSO) are two of the most popular research topics for tackling real-parameter optimization problems in evolutionary computa...
Chang-Tai Hsieh, Chih-Ming Chen, Ying-Ping Chen
SIGCOMM
1994
ACM
15 years 7 months ago
Making Greed Work in Networks: A Game-Theoretic Analysis of Switch Service Disciplines
This paper discusses congestion control from a game-theoretic perspective. There are two basic premises: (1) users are assumed to be independent and sel sh, and (2) central admini...
Scott Shenker
TCS
2008
15 years 2 months ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld