Sciweavers

1134 search results - page 202 / 227
» Optimizing Designs based on Risk Approach
Sort
View
ICFP
2002
ACM
16 years 3 months ago
Monads for incremental computing
This paper presents a monadic approach to incremental computation, suitable for purely functional languages such as Haskell. A program that uses incremental computation is able to...
Magnus Carlsson
111
Voted
GLOBECOM
2009
IEEE
15 years 10 months ago
Local Estimation of Probabilities of Direct and Staggered Collisions in 802.11 WLANs
—Current 802.11 networks do not typically achieve the maximum potential throughput despite link adaptation and crosslayer optimization techniques designed to alleviate many cause...
Michael N. Krishnan, Sofie Pollin, Avideh Zakhor
ICDCSW
2009
IEEE
15 years 10 months ago
Joint Sleep Scheduling and Mode Assignment in Wireless Cyber-Physical Systems
Designing cyber-physical systems with high efficiency, adaptability, autonomy, reliability and usability is a challenging task. In this paper, we focus on minimizing networkwide ...
Chun Jason Xue, Guoliang Xing, Zhaohui Yuan, Zili ...
146
Voted
GECCO
2009
Springer
166views Optimization» more  GECCO 2009»
15 years 10 months ago
Genetic programming in the wild: evolving unrestricted bytecode
We describe a methodology for evolving Java bytecode, enabling the evolution of extant, unrestricted Java programs, or programs in other languages that compile to Java bytecode. B...
Michael Orlov, Moshe Sipper
119
Voted
DATE
2008
IEEE
107views Hardware» more  DATE 2008»
15 years 10 months ago
Instruction Set Extension Exploration in Multiple-Issue Architecture
To satisfy high-performance computing demand in modern embedded devices, current embedded processor architectures provide designer with possibility either to define customized ins...
I-Wei Wu, Zhi-Yuan Chen, Jean Jyh-Jiun Shann, Chun...