Sciweavers

17582 search results - page 3487 / 3517
» From Distributed Sequential Computing to Distributed Paralle...
Sort
View
SOSP
2007
ACM
15 years 10 months ago
Bouncer: securing software by blocking bad input
Attackers exploit software vulnerabilities to control or crash programs. Bouncer uses existing software instrumentation techniques to detect attacks and it generates filters auto...
Manuel Costa, Miguel Castro, Lidong Zhou, Lintao Z...
111
Voted
P2P
2009
IEEE
115views Communications» more  P2P 2009»
15 years 8 months ago
Modeling and Analysis of Bandwidth-Inhomogeneous Swarms in BitTorrent
—A number of analytical models exists that capture various properties of the BitTorrent protocol. However, until now virtually all of these models have been based on the assumpti...
Michel Meulpolder, Johan A. Pouwelse, Dick H. J. E...
ISCA
2009
IEEE
152views Hardware» more  ISCA 2009»
15 years 8 months ago
Scaling the bandwidth wall: challenges in and avenues for CMP scaling
As transistor density continues to grow at an exponential rate in accordance to Moore’s law, the goal for many Chip Multi-Processor (CMP) systems is to scale the number of on-ch...
Brian M. Rogers, Anil Krishna, Gordon B. Bell, Ken...
ATAL
2009
Springer
15 years 8 months ago
First principles planning in BDI systems
BDI (Belief, Desire, Intention) agent systems are very powerful, but they lack the ability to incorporate planning. There has been some previous work to incorporate planning withi...
Lavindra de Silva, Sebastian Sardiña, Lin P...
128
Voted
GECCO
2009
Springer
109views Optimization» more  GECCO 2009»
15 years 8 months ago
Canonical representation genetic programming
Search spaces sampled by the process of Genetic Programming often consist of programs which can represent a function in many different ways. Thus, when the space is examined it i...
John R. Woodward, Ruibin Bai
« Prev « First page 3487 / 3517 Last » Next »