Sciweavers

436 search results - page 38 / 88
» On two variations of identifying codes
Sort
View
GECCO
2009
Springer
103views Optimization» more  GECCO 2009»
15 years 4 months ago
Why evolution is not a good paradigm for program induction: a critique of genetic programming
We revisit the roots of Genetic Programming (i.e. Natural Evolution), and conclude that the mechanisms of the process of evolution (i.e. selection, inheritance and variation) are ...
John R. Woodward, Ruibin Bai
MOBISYS
2005
ACM
15 years 9 months ago
The Horus WLAN location determination system
We present the design and implementation of the Horus WLAN location determination system. The design of the Horus system aims at satisfying two goals: high accuracy and low comput...
Moustafa Youssef, Ashok K. Agrawala
ACMMSP
2005
ACM
99views Hardware» more  ACMMSP 2005»
15 years 3 months ago
Gated memory control for memory monitoring, leak detection and garbage collection
ct In the past, program monitoring often operates at the code level, performing checks at function and loop boundaries. Recent research shows that profiling analysis can identify ...
Chen Ding, Chengliang Zhang, Xipeng Shen, Mitsunor...
ICALP
2000
Springer
15 years 1 months ago
Scalable Secure Storage when Half the System Is Faulty
In this paper, we provide a method to safely store a document in perhaps the most challenging settings, a highly decentralized replicated storage system where up to half of the st...
Noga Alon, Haim Kaplan, Michael Krivelevich, Dahli...
TCSV
2010
14 years 4 months ago
Quad-Tree Motion Modeling With Leaf Merging
In this paper, we are concerned with the modeling of motion between frames of a video sequence. Typically, it is not possible to represent the motion between frames by a single mod...
Reji Mathew, David S. Taubman