Sciweavers

5675 search results - page 108 / 1135
» Exploiting Chaos for Computation
Sort
View
97
Voted
AAAI
2000
15 years 2 months ago
Exploiting a Thesaurus-Based Semantic Net for Knowledge-Based Search
With the growth of on-line information, the need for better resource location services is growing rapidly. A popular goal is to conduct search in terms of concepts, rather than wo...
Peter Clark, John Thompson, Heather Holmback, Lisb...
118
Voted
ISLPED
2010
ACM
181views Hardware» more  ISLPED 2010»
14 years 11 months ago
Exploiting power budgeting in thermal-aware dynamic placement for reconfigurable systems
 In this paper, a novel thermal-aware dynamic placement planner for reconfigurable systems is presented, which targets transient temperature reduction. Rather than solving time-...
Shahin Golshan, Eli Bozorgzadeh, Benjamin Carri&oa...
132
Voted
CNSM
2010
14 years 7 months ago
Capacity planning and power management to exploit sustainable energy
This paper describes an approach for designing a power management plan that matches the supply of power with the demand for power in data centers. Power may come from the grid, fro...
Daniel Gmach, Jerry Rolia, Cullen Bash, Yuan Chen,...
126
Voted
CORR
2010
Springer
102views Education» more  CORR 2010»
14 years 7 months ago
Superior Exploration-Exploitation Balance with Quantum-Inspired Hadamard Walks
This paper extends the analogies employed in the development of quantum-inspired evolutionary algorithms by proposing quantum-inspired Hadamard walks, called QHW. A novel quantum-...
Sisir Koppaka, Ashish Ranjan Hota
103
Voted
CCS
2004
ACM
15 years 6 months ago
Testing network-based intrusion detection signatures using mutant exploits
Misuse-based intrusion detection systems rely on models of attacks to identify the manifestation of intrusive behavior. Therefore, the ability of these systems to reliably detect ...
Giovanni Vigna, William K. Robertson, Davide Balza...