Sciweavers

6518 search results - page 1231 / 1304
» Distributed Individual-Based Simulation
Sort
View
GECCO
2007
Springer
268views Optimization» more  GECCO 2007»
15 years 8 months ago
Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols
Design, development and evaluation of adaptive, scalable, and power aware Bio/Nature inspired routing protocols has received a significant amount of attention in the recent past....
Nauman Mazhar, Muddassar Farooq
GECCO
2007
Springer
168views Optimization» more  GECCO 2007»
15 years 8 months ago
Evolutionary benefits of evolvable component integration
A system composed of multiple interacting components is capable of responding to contextual information and producing a higher range of non-linear responses to stimuli compared to...
David Malkin, R. Beau Lotto
120
Voted
GECCO
2007
Springer
192views Optimization» more  GECCO 2007»
15 years 8 months ago
On the runtime analysis of the 1-ANT ACO algorithm
The runtime analysis of randomized search heuristics is a growing field where, in the last two decades, many rigorous results have been obtained. These results, however, apply pa...
Benjamin Doerr, Frank Neumann, Dirk Sudholt, Carst...
ICS
2007
Tsinghua U.
15 years 8 months ago
Cooperative cache partitioning for chip multiprocessors
This paper presents Cooperative Cache Partitioning (CCP) to allocate cache resources among threads concurrently running on CMPs. Unlike cache partitioning schemes that use a singl...
Jichuan Chang, Gurindar S. Sohi
ICS
2007
Tsinghua U.
15 years 8 months ago
An L2-miss-driven early register deallocation for SMT processors
The register file is one of the most critical datapath components limiting the number of threads that can be supported on a Simultaneous Multithreading (SMT) processor. To allow t...
Joseph J. Sharkey, Dmitry V. Ponomarev
« Prev « First page 1231 / 1304 Last » Next »