Sciweavers

291 search results - page 57 / 59
» Implementation with a bounded action space
Sort
View
ECBS
1999
IEEE
138views Hardware» more  ECBS 1999»
13 years 10 months ago
Multi-Domain Surety Modeling and Analysis for High Assurance Systems
Engineering systems are becoming increasingly complex as state of the art technologies are incorporated into designs. Surety modeling and analysis is an emerging science which per...
James Davis, Jason Scott, Janos Sztipanovits, Marc...
SIGGRAPH
1999
ACM
13 years 10 months ago
LDI Tree: A Hierarchical Representation for Image-Based Rendering
Using multiple reference images in 3D image warping has been a challenging problem. Recently, the Layered Depth Image (LDI) was proposed by Shade et al. to merge multiple referenc...
Chun-Fa Chang, Gary Bishop, Anselmo Lastra
SIGMETRICS
1997
ACM
111views Hardware» more  SIGMETRICS 1997»
13 years 10 months ago
Cache Behavior of Network Protocols
In this paper we present a performance study of memory reference behavior in network protocol processing, using an Internet-based protocol stack implemented in the x-kernel runnin...
Erich M. Nahum, David J. Yates, James F. Kurose, D...
CCS
2006
ACM
13 years 8 months ago
Dynamic rule-ordering optimization for high-speed firewall filtering
Packet filtering plays a critical role in many of the current high speed network technologies such as firewalls and IPSec devices. The optimization of firewall policies is critica...
Hazem Hamed, Ehab Al-Shaer
PDCN
2004
13 years 7 months ago
Scalable parallel algorithms for difficult combinatorial problems: A case study in optimization
A novel combination of emergent algorithmic methods, powerful computational platforms and supporting infrastructure is described. These complementary tools and technologies are us...
Faisal N. Abu-Khzam, Michael A. Langston, Pushkar ...