Sciweavers

4498 search results - page 283 / 900
» How to Invent Functions
Sort
View
CASES
2003
ACM
15 years 10 months ago
AES and the cryptonite crypto processor
CRYPTONITE is a programmable processor tailored to the needs of crypto algorithms. The design of CRYPTONITE was based on an in-depth application analysis in which standard crypto ...
Dino Oliva, Rainer Buchty, Nevin Heintze
GECCO
2003
Springer
182views Optimization» more  GECCO 2003»
15 years 10 months ago
Modeling the Search Landscape of Metaheuristic Software Clustering Algorithms
Abstract. Software clustering techniques are useful for extracting architectural information about a system directly from its source code structure. This paper starts by examining ...
Brian S. Mitchell, Spiros Mancoridis
148
Voted
COOPIS
2002
IEEE
15 years 9 months ago
The Design and Performance of the jRate Real-Time Java Implementation
Over 90 percent of all microprocessors are now used for realtime and embedded applications. Since the behavior of these applications is often constrained by the physical world, it...
Angelo Corsaro, Douglas C. Schmidt
PG
2002
IEEE
15 years 9 months ago
Approximation with Active B-Spline Curves and Surfaces
An active contour model for parametric curve and surface approximation is presented. The active curve or surface adapts to the model shape to be approximated in an optimization al...
Helmut Pottmann, Stefan Leopoldseder, Michael Hofe...
129
Voted
CDC
2009
IEEE
173views Control Systems» more  CDC 2009»
15 years 9 months ago
Fault tolerant control allocation for a thruster-controlled floating platform using parametric programming
— The task in control allocation is to determine how to generate a specified generalized force from a redundant set of control effectors where the associated actuator control in...
Jørgen Spjøtvold, Tor Arne Johansen