Sciweavers

3038 search results - page 537 / 608
» Industrial evolutionary computing
Sort
View
JFP
2007
126views more  JFP 2007»
15 years 3 months ago
Engineering Software Correctness
Software engineering courses offer one of many opportunities for providing students with a significant experience in declarative programming. This report discusses some results fr...
Rex L. Page
134
Voted
CGF
1998
118views more  CGF 1998»
15 years 3 months ago
An Exhaustive Error-Bounding Algorithm for Hierarchical Radiosity
This paper presents a complete algorithm for the evaluation and control of error in radiosity calculations. Providing such control is both extremely important for industrial appli...
Nicolas Holzschuch, François X. Sillion
FGCS
2010
84views more  FGCS 2010»
15 years 2 months ago
System-level virtualization research at Oak Ridge National Laboratory
System-level virtualization is today enjoying a rebirth, after first gaining popularity in the 1970s as a technique to effectively share what were then considered large computin...
Stephen L. Scott, Geoffroy Vallée, Thomas N...
MOBICOM
2012
ACM
13 years 6 months ago
CloudIQ: a framework for processing base stations in a data center
The cellular industry is evaluating architectures to distribute the signal processing in radio access networks. One of the options is to process the signals of all base stations o...
Sourjya Bhaumik, Shoban Preeth Chandrabose, Manjun...
152
Voted
ISI
2008
Springer
15 years 3 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham