Sciweavers

5314 search results - page 930 / 1063
» Hybrid Dynamic Programming
Sort
View
B
2007
Springer
15 years 2 months ago
Security Policy Enforcement Through Refinement Process
Abstract. In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue...
Nicolas Stouls, Marie-Laure Potet
CASES
2007
ACM
15 years 2 months ago
An integrated ARM and multi-core DSP simulator
In this paper we describe the design and implementation of a flexible, and extensible, just-in-time ARM simulator designed to run co-operatively with a multi-core DSP simulator on...
Sharad Singhai, MingYung Ko, Sanjay Jinturkar, May...
ECAL
2007
Springer
15 years 1 months ago
Genotype Reuse More Important than Genotype Size in Evolvability of Embodied Neural Networks
odel of Embodiment on Abstract Systems: from Hierarchy to Heterarchy Kohei Nakajima, Soya Shinkai, Takashi Ikegami A Behavior-Based Model of the Hydra, Phylum Cnidaria Malin Aktius...
Chad W. Seys, Randall D. Beer
DAC
2010
ACM
15 years 1 months ago
Eyecharts: constructive benchmarking of gate sizing heuristics
—Discrete gate sizing is one of the most commonly used, flexible, and powerful techniques for digital circuit optimization. The underlying problem has been proven to be NP-hard ...
Puneet Gupta, Andrew B. Kahng, Amarnath Kasibhatla...
EUROSYS
2007
ACM
15 years 1 months ago
Discrete control for safe execution of IT automation workflows
As information technology (IT) administration becomes increasingly complex, workflow technologies are gaining popularity for IT automation. Writing correct workflow programs is no...
Yin Wang, Terence Kelly, Stéphane Lafortune