Sciweavers

3796 search results - page 504 / 760
» Presentations by Programmers for Programmers
Sort
View
116
Voted
CEC
2005
IEEE
15 years 9 months ago
Finding attack strategies for predator swarms using genetic algorithms
Abstract- Behavior based architectures have many parameters that must be tuned to produce effective and believable agents. We use genetic algorithms to tune simple behavior based c...
Ryan E. Leigh, Tony Morelli, Sushil J. Louis, Moni...
137
Voted
DATE
2005
IEEE
110views Hardware» more  DATE 2005»
15 years 9 months ago
Test Time Reduction Reusing Multiple Processors in a Network-on-Chip Based Architecture
The increasing complexity and the short life cycles of embedded systems are pushing the current system-onchip designs towards a rapid increasing on the number of programmable proc...
Alexandre M. Amory, Marcelo Lubaszewski, Fernando ...
125
Voted
DATE
2005
IEEE
168views Hardware» more  DATE 2005»
15 years 9 months ago
Hardware Acceleration of Hidden Markov Model Decoding for Person Detection
This paper explores methods for hardware acceleration of Hidden Markov Model (HMM) decoding for the detection of persons in still images. Our architecture exploits the inherent st...
Suhaib A. Fahmy, Peter Y. K. Cheung, Wayne Luk
126
Voted
DEEC
2005
IEEE
15 years 9 months ago
Ontologizing EDI: First Steps and Initial Experience
Electronic Data Interchange (EDI) standards for transmission of business messages were promulgated in the 1970s. As standards became more complex to provide additional message typ...
Douglas Foxvog, Christoph Bussler
150
Voted
IPPS
2005
IEEE
15 years 9 months ago
Automated Analysis of Memory Access Behavior
Abstract— We developed an automated environment to measure the memory access behavior of applications on high performance clusters. Code optimization for processor caches is cruc...
Michael Gerndt, Tianchao Li