Sciweavers

1414 search results - page 116 / 283
» Combining Intruder Theories
Sort
View
204
Voted
ISCA
2010
IEEE
413views Hardware» more  ISCA 2010»
15 years 5 months ago
Resistive computation: avoiding the power wall with low-leakage, STT-MRAM based computing
As CMOS scales beyond the 45nm technology node, leakage concerns are starting to limit microprocessor performance growth. To keep dynamic power constant across process generations...
Xiaochen Guo, Engin Ipek, Tolga Soyata
ICRA
2002
IEEE
161views Robotics» more  ICRA 2002»
15 years 5 months ago
A Method for Co-Evolving Morphology and Walking Pattern of Biped Humanoid Robot
— In this paper, we present a method for co-evolving structures and controller of biped walking robots. Currently, biped walking humanoid robots are designed manually on trial-an...
Ken Endo, Fuminori Yamasaki, Takashi Maeno, Hiroak...
TPHOL
2002
IEEE
15 years 5 months ago
Type-Theoretic Functional Semantics
We describe the operational and denotational semantics of a small imperative language in type theory with inductive and recursive definitions. The operational semantics is given b...
Yves Bertot, Venanzio Capretta, Kuntal Das Barman
CIKM
2001
Springer
15 years 5 months ago
Merging Techniques for Performing Data Fusion on the Web
Data fusion on the Web refers to the merging, into a unified single list, of the ranked document lists, which are retrieved in response to a user query by more than one Web search...
Theodora Tsikrika, Mounia Lalmas
IPPS
1999
IEEE
15 years 5 months ago
A Structured Approach to Parallel Programming: Methodology and Models
Parallel programming continues to be difficult, despite substantial and ongoing research aimed at making it tractable. Especially dismaying is the gulf between theory and the pract...
Berna L. Massingill