Sciweavers

1265 search results - page 128 / 253
» Computer poker: A review
Sort
View
FTDCS
1999
IEEE
15 years 2 months ago
Supporting Real World Security Models in Java
The Java Security Model has undergone considerable evolution since its initial implementation. However, due to its historical focus on securing machines against attack from hostil...
Ian Welch, Robert J. Stroud
ICNP
1999
IEEE
15 years 2 months ago
Fault Detection in Routing Protocols
Routing protocol faults cause problems ranging from an inability to communicate to excessive routing overhead. This paper proposes a system for detecting a wide range of routing p...
Daniel Massey, Bill Fenner
KES
1999
Springer
15 years 2 months ago
Parallel genetic algorithm taxonomy
—Genetic Algorithms (GAs) are powerful search techniques that are used to solve difficult problems in many disciplines. Unfortunately, they can be very demanding in terms of com...
Mariusz Nowostawski, Riccardo Poli
IEEEPACT
1998
IEEE
15 years 2 months ago
Scanning Polyhedra without Do-loops
We study in this paper the problem of polyhedron scanning which appears for example when generating code for transformed loop nests in automatic parallelization. After a review of...
Pierre Boulet, Paul Feautrier
ISLPED
1998
ACM
84views Hardware» more  ISLPED 1998»
15 years 2 months ago
Low power architecture of the soft-output Viterbi algorithm
CT This paper investigates the low power implementation issues of the soft-output Viterbi algorithm (SOVA), a building block for turbo codes. By briefly explaining the theory of t...
David Garrett, Mircea R. Stan