Sciweavers

1134 search results - page 202 / 227
» Optimizing Designs based on Risk Approach
Sort
View
ICFP
2002
ACM
15 years 9 months ago
Monads for incremental computing
This paper presents a monadic approach to incremental computation, suitable for purely functional languages such as Haskell. A program that uses incremental computation is able to...
Magnus Carlsson
GLOBECOM
2009
IEEE
15 years 4 months ago
Local Estimation of Probabilities of Direct and Staggered Collisions in 802.11 WLANs
—Current 802.11 networks do not typically achieve the maximum potential throughput despite link adaptation and crosslayer optimization techniques designed to alleviate many cause...
Michael N. Krishnan, Sofie Pollin, Avideh Zakhor
ICDCSW
2009
IEEE
15 years 4 months ago
Joint Sleep Scheduling and Mode Assignment in Wireless Cyber-Physical Systems
Designing cyber-physical systems with high efficiency, adaptability, autonomy, reliability and usability is a challenging task. In this paper, we focus on minimizing networkwide ...
Chun Jason Xue, Guoliang Xing, Zhaohui Yuan, Zili ...
GECCO
2009
Springer
166views Optimization» more  GECCO 2009»
15 years 4 months ago
Genetic programming in the wild: evolving unrestricted bytecode
We describe a methodology for evolving Java bytecode, enabling the evolution of extant, unrestricted Java programs, or programs in other languages that compile to Java bytecode. B...
Michael Orlov, Moshe Sipper
DATE
2008
IEEE
107views Hardware» more  DATE 2008»
15 years 4 months ago
Instruction Set Extension Exploration in Multiple-Issue Architecture
To satisfy high-performance computing demand in modern embedded devices, current embedded processor architectures provide designer with possibility either to define customized ins...
I-Wei Wu, Zhi-Yuan Chen, Jean Jyh-Jiun Shann, Chun...