Sciweavers

936 search results - page 164 / 188
» Mathematical Models of Endocrine Systems
Sort
View
ISCAS
2008
IEEE
129views Hardware» more  ISCAS 2008»
15 years 10 months ago
Physical unclonable function with tristate buffers
— The lack of robust tamper-proofing techniques in security applications has provided attackers the ability to virtually circumvent mathematically strong cryptographic primitive...
Erdinç Öztürk, Ghaith Hammouri, B...
ISPASS
2007
IEEE
15 years 10 months ago
An Analysis of Performance Interference Effects in Virtual Environments
Virtualization is an essential technology in modern datacenters. Despite advantages such as security isolation, fault isolation, and environment isolation, current virtualization ...
Younggyun Koh, Rob C. Knauerhase, Paul Brett, Mic ...
ECOOP
2007
Springer
15 years 10 months ago
Generational Real-Time Garbage Collection
Abstract. While real-time garbage collection is now available in production virtual machines, the lack of generational capability means applications with high allocation rates are ...
Daniel Frampton, David F. Bacon, Perry Cheng, Davi...
ICALT
2006
IEEE
15 years 10 months ago
Online Discussion Processes: Effects of Earlier Messages' Evaluations, Knowledge Content, Social Cues and Personal Information o
This study of the flow of online discussions examined how earlier messages affected later messages along five dimensions: (1) evaluations (agree, disagree, or unresponsive actions...
Gaowei Chen, Ming Ming Chiu
GECCO
2005
Springer
139views Optimization» more  GECCO 2005»
15 years 9 months ago
A genetic algorithm for unmanned aerial vehicle routing
Genetic Algorithms (GAs) can efficiently produce high quality results for hard combinatorial real world problems such as the Vehicle Routing Problem (VRP). Genetic Vehicle Represe...
Matthew A. Russell, Gary B. Lamont