Sciweavers

747 search results - page 55 / 150
» TODS Special Issues
Sort
View
GECCO
2005
Springer
129views Optimization» more  GECCO 2005»
15 years 5 months ago
Search space modulation in genetic algorithms: evolving the search space by sinusoidal transformations
An experimental form of Modulation (Reinterpretation) of the Search Space is presented. This modulation is developed as a mathematical method that can be implemented directly into...
José Antonio Martin H.
FPGA
2004
ACM
119views FPGA» more  FPGA 2004»
15 years 5 months ago
In-system FPGA prototyping of an itanium microarchitecture
We describe an effort to prototype an Itanium microarchitecture using an FPGA. The microarchitecture model is written in the Bluespec hardware description language (HDL) and suppo...
Roland E. Wunderlich, James C. Hoe
GI
2004
Springer
15 years 5 months ago
User Authentication in Sensor Networks
d Abstract) Zinaida Benenson Felix G¨artner Dogan Kesdogan RWTH Aachen, Department of Computer Science, D-52056 Aachen, Germany : If the data collected within a sensor network is ...
Zinaida Benenson, Felix C. Gärtner, Dogan Kes...
CHI
2003
ACM
15 years 5 months ago
ShownPass: an easy access control with a displayed password
Access control is one of the most important issue with ubiquitous networking environment. Traditional access control methods are mainly considering authentication of registered us...
Yuji Ayatsuka, Michimune Kohno, Jun Rekimoto
ANSS
2002
IEEE
15 years 4 months ago
Gang Scheduling Performance on a Cluster of Non-Dedicated Workstations
Clusters of workstations have emerged as a costeffective solution to high performance computing problem. To take advantage of any opportunities, however, effective scheduling tech...
Helen D. Karatza