Sciweavers

20197 search results - page 3792 / 4040
» Comparing Computational Power
Sort
View
CRYPTO
2005
Springer
97views Cryptology» more  CRYPTO 2005»
15 years 6 months ago
Generic Transformation for Scalable Broadcast Encryption Schemes
Broadcast encryption schemes allow a message sender to broadcast an encrypted data so that only legitimate receivers decrypt it. Because of the intrinsic nature of one-to-many comm...
Jung Yeon Hwang, Dong Hoon Lee, Jongin Lim
106
Voted
GECCO
2005
Springer
156views Optimization» more  GECCO 2005»
15 years 6 months ago
Parameterized versus generative representations in structural design: an empirical comparison
Any computational approach to design, including the use of evolutionary algorithms, requires the transformation of the domain-specific knowledge into a formal design representatio...
Rafal Kicinger, Tomasz Arciszewski, Kenneth A. De ...
114
Voted
GECCO
2005
Springer
232views Optimization» more  GECCO 2005»
15 years 6 months ago
A hardware pipeline for function optimization using genetic algorithms
Genetic Algorithms (GAs) are very commonly used as function optimizers, basically due to their search capability. A number of different serial and parallel versions of GA exist. ...
Malay Kumar Pakhira, Rajat K. De
94
Voted
ICS
2005
Tsinghua U.
15 years 6 months ago
Towards automatic translation of OpenMP to MPI
We present compiler techniques for translating OpenMP shared-memory parallel applications into MPI messagepassing programs for execution on distributed memory systems. This transl...
Ayon Basumallik, Rudolf Eigenmann
106
Voted
ICS
2005
Tsinghua U.
15 years 6 months ago
Lightweight reference affinity analysis
Previous studies have shown that array regrouping and structure splitting significantly improve data locality. The most effective technique relies on profiling every access to eve...
Xipeng Shen, Yaoqing Gao, Chen Ding, Roch Archamba...
« Prev « First page 3792 / 4040 Last » Next »