Sciweavers

9 search results - page 2 / 2
» Program Obfuscation Scheme Using Random Numbers to Complicat...
Sort
View
GECCO
2003
Springer
128views Optimization» more  GECCO 2003»
15 years 4 months ago
The Principle of Maximum Entropy-Based Two-Phase Optimization of Fuzzy Controller by Evolutionary Programming
In this paper, a two-phase evolutionary optimization scheme is proposed for obtaining optimal structure of fuzzy control rules and their associated weights, using evolutionary prog...
Chi-Ho Lee, Ming Yuchi, Hyun Myung, Jong-Hwan Kim
ISCC
2003
IEEE
153views Communications» more  ISCC 2003»
15 years 5 months ago
Fuzzy Explicit Marking for Congestion Control in Differentiated Services Networks
This paper presents a new active queue management scheme, Fuzzy Explicit Marking (FEM), implemented within the differentiated services (Diff-Serv) framework to provide congestion ...
Chrysostomos Chrysostomou, Andreas Pitsillides, Ge...
CDC
2009
IEEE
124views Control Systems» more  CDC 2009»
15 years 24 days ago
Inverse modeling for open boundary conditions in channel network
Abstract-- An inverse modeling problem for systems governed by first-order, hyperbolic partial differential equations subject to periodic forcing is investigated. The problem is de...
Qingfang Wu, Mohammad Rafiee, Andrew Tinka, Alexan...
VLSISP
2008
173views more  VLSISP 2008»
14 years 11 months ago
Fast Bit Gather, Bit Scatter and Bit Permutation Instructions for Commodity Microprocessors
Advanced bit manipulation operations are not efficiently supported by commodity word-oriented microprocessors. Programming tricks are typically devised to shorten the long sequence...
Yedidya Hilewitz, Ruby B. Lee