Sciweavers

1282 search results - page 105 / 257
» Practical Loss-Resilient Codes
Sort
View
GECCO
2005
Springer
149views Optimization» more  GECCO 2005»
15 years 10 months ago
There's more to a model than code: understanding and formalizing in silico modeling experience
Mapping biology into computation has both a domain specific aspect – biological theory – and a methodological aspect – model development. Computational modelers have implici...
Janet Wiles, Nicholas Geard, James Watson, Kai Wil...
GROUP
2003
ACM
15 years 10 months ago
"Breaking the code", moving between private and public work in collaborative software development
Software development is typically cooperative endeavor where a group of engineers need to work together to achieve a common, coordinated result. As a cooperative effort, it is esp...
Cleidson R. B. de Souza, David F. Redmiles, Paul D...
ASAP
2007
IEEE
112views Hardware» more  ASAP 2007»
15 years 6 months ago
Scheduling Register-Allocated Codes in User-Guided High-Level Synthesis
In high-level synthesis, as for compilers, an important question is when register assignment should take place. Unlike compilers for which the processor architecture is given, syn...
Alain Darte, C. Quinson
GECCO
2008
Springer
126views Optimization» more  GECCO 2008»
15 years 6 months ago
The impact of population size on code growth in GP: analysis and empirical validation
The crossover bias theory for bloat [18] is a recent result which predicts that bloat is caused by the sampling of short, unfit programs. This theory is clear and simple, but it ...
Riccardo Poli, Nicholas Freitag McPhee, Leonardo V...
USENIX
2007
15 years 7 months ago
From STEM to SEAD: Speculative Execution for Automated Defense
Most computer defense systems crash the process that they protect as part of their response to an attack. Although recent research explores the feasibility of selfhealing to autom...
Michael E. Locasto, Angelos Stavrou, Gabriela F. C...