Sciweavers

24529 search results - page 4579 / 4906
» Computing on Authenticated Data
Sort
View
FAST
2011
14 years 8 months ago
Exploiting Half-Wits: Smarter Storage for Low-Power Devices
This work analyzes the stochastic behavior of writing to embedded flash memory at voltages lower than recommended by a microcontroller’s specifications to reduce energy consum...
Mastooreh Salajegheh, Yue Wang, Kevin Fu, Anxiao J...
GECCO
2011
Springer
256views Optimization» more  GECCO 2011»
14 years 8 months ago
Evolving complete robots with CPPN-NEAT: the utility of recurrent connections
This paper extends prior work using Compositional Pattern Producing Networks (CPPNs) as a generative encoding for the purpose of simultaneously evolving robot morphology and contr...
Joshua E. Auerbach, Josh C. Bongard
186
Voted
IAJIT
2011
14 years 8 months ago
Network load and packet loss optimization during handoff using multi-scan approach
: Handoff is a critical function that enables mobile nodes to stay connected to the wireless network by switching the data connection from one WLAN to another. During handoff the c...
Anwar Saif, Mohammed Othman
178
Voted
IWANN
2011
Springer
14 years 7 months ago
Isometric Coding of Spiking Haptic Signals by Peripheral Somatosensory Neurons
Abstract. We study how primary tactile afferents encode relevant contact features to mediate early processing of haptic information. In this paper, we apply metrical information t...
Romain Brasselet, Roland S. Johansson, Angelo Arle...
KCAP
2011
ACM
14 years 7 months ago
An analysis of open information extraction based on semantic role labeling
Open Information Extraction extracts relations from text without requiring a pre-specified domain or vocabulary. While existing techniques have used only shallow syntactic featur...
Janara Christensen, Mausam, Stephen Soderland, Ore...
« Prev « First page 4579 / 4906 Last » Next »