Sciweavers

10797 search results - page 2091 / 2160
» Robust control applications
Sort
View
FPGA
2005
ACM
97views FPGA» more  FPGA 2005»
15 years 4 months ago
Techniques for synthesizing binaries to an advanced register/memory structure
Recent works demonstrate several benefits of synthesizing software binaries onto FPGA hardware, including incorporating hardware design into established software tool flows with m...
Greg Stitt, Zhi Guo, Walid A. Najjar, Frank Vahid
81
Voted
GECCO
2005
Springer
140views Optimization» more  GECCO 2005»
15 years 4 months ago
CGP visits the Santa Fe trail: effects of heuristics on GP
GP uses trees to represent chromosomes. The user defines the representation space by defining the set of functions and terminals to label the nodes in the trees, and GP searches t...
Cezary Z. Janikow, Christopher J. Mann
GECCO
2005
Springer
160views Optimization» more  GECCO 2005»
15 years 4 months ago
Exploring relationships between genotype and oral cancer development through XCS
In medical research, being able to justify decisions is generally as important as taking the right ones. Interpretability is then one of the chief characteristics a learning algor...
Alessandro Passaro, Flavio Baronti, Valentina Magg...
GI
2005
Springer
15 years 4 months ago
Distributed User Modeling for Situated Interaction
: A distributed service to model and control contextual information in mobile and ubiquitous computing environments is presented in this paper. We introduce the general user model ...
Dominik Heckmann
IFIP
2005
Springer
15 years 4 months ago
Global Internet Routing Forensics: Validation of BGP Paths Using ICMP Traceback
Nearly all network applications rely on the global Internet routing infrastructure to compute routes and deliver packets. Unfortunately, false Internet routes can be maliciously in...
Eunjong Kim, Daniel Massey, Indrajit Ray
« Prev « First page 2091 / 2160 Last » Next »