Sciweavers

2006 search results - page 63 / 402
» Heuristic Security-Testing Methods
Sort
View
PKC
2010
Springer
199views Cryptology» more  PKC 2010»
14 years 9 months ago
Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval
The Pollard kangaroo method solves the discrete logarithm problem (DLP) in an interval of size N with heuristic average case expected running time approximately 2 √ N group opera...
Steven D. Galbraith, Raminder S. Ruprai
IEEEPACT
2008
IEEE
15 years 5 months ago
Feature selection and policy optimization for distributed instruction placement using reinforcement learning
Communication overheads are one of the fundamental challenges in a multiprocessor system. As the number of processors on a chip increases, communication overheads and the distribu...
Katherine E. Coons, Behnam Robatmili, Matthew E. T...
68
Voted
DATE
2004
IEEE
147views Hardware» more  DATE 2004»
15 years 2 months ago
Automatic Tuning of Two-Level Caches to Embedded Applications
The power consumed by the memory hierarchy of a microprocessor can contribute to as much as 50% of the total microprocessor system power, and is thus a good candidate for optimiza...
Ann Gordon-Ross, Frank Vahid, Nikil Dutt
66
Voted
EOR
2008
93views more  EOR 2008»
14 years 11 months ago
A survey of surface mount device placement machine optimisation: Machine classification
The optimisation of a printed circuit board assembly line is mainly influenced by the constraints of the surface mount device (SMD) placement machine and the characteristics of th...
Masri Ayob, Graham Kendall
JAIR
2006
111views more  JAIR 2006»
14 years 11 months ago
Learning in Real-Time Search: A Unifying Framework
Real-time search methods are suited for tasks in which the agent is interacting with an initially unknown environment in real time. In such simultaneous planning and learning prob...
Vadim Bulitko, Greg Lee