Sciweavers

4335 search results - page 654 / 867
» Privatizing Constraint Optimization
Sort
View
132
Voted
GECCO
2006
Springer
179views Optimization» more  GECCO 2006»
15 years 7 months ago
Evolving cooperative behavior in a power market
This paper presents an evolutionary algorithm to develop cooperative strategies for power buyers in a deregulated electrical power market. Cooperative strategies are evolved throu...
Dipti Srinivasan, Dakun Woo, Lily Rachmawati, Kong...
158
Voted
CODES
2001
IEEE
15 years 7 months ago
System canvas: a new design environment for embedded DSP and telecommunication systems
We present a new design environment, called System Canvas, targeted at DSP and telecommunication system designs. Our environment uses an easy-to-use block-diagram syntax to specif...
Praveen K. Murthy, Etan G. Cohen, Steve Rowland
CHES
2003
Springer
146views Cryptology» more  CHES 2003»
15 years 7 months ago
Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs
Abstract. Performance evaluation of the Advanced Encryption Standard candidates has led to intensive study of both hardware and software implementations. However, although plentifu...
François-Xavier Standaert, Gaël Rouvro...
138
Voted
ISSS
2000
IEEE
127views Hardware» more  ISSS 2000»
15 years 7 months ago
Low Power Storage Cycle Budget Distribution Tool Support for Hierarchical Graphs
In data dominated applications, like multi-media and telecom applications, data storage and transfers are the most important factors in terms of energy consumption, area and syste...
Erik Brockmeyer, Arnout Vandecappelle, Sven Wuytac...
STOC
1995
ACM
145views Algorithms» more  STOC 1995»
15 years 7 months ago
Polynomial time approximation schemes for dense instances of NP-hard problems
We present a unified framework for designing polynomial time approximation schemes (PTASs) for “dense” instances of many NP-hard optimization problems, including maximum cut,...
Sanjeev Arora, David R. Karger, Marek Karpinski