Sciweavers

3905 search results - page 334 / 781
» Teaching Design Patterns
Sort
View
ASAP
2007
IEEE
134views Hardware» more  ASAP 2007»
15 years 6 months ago
Methodology and Toolset for ASIP Design and Development Targeting Cryptography-Based Applications
Network processors utilizing general-purpose instruction-set architectures (ISA) limit network throughput due to latency incurred from cryptography and hashing applications (AES, ...
David Montgomery, Ali Akoglu
CASCON
1996
120views Education» more  CASCON 1996»
15 years 5 months ago
Communication costs in code and design reviews: an empirical study
Software development managers strive to control all of the factors that might impact the success of their projects. However, not all of these factors have been identified, much le...
Carolyn B. Seaman
GECCO
2008
Springer
139views Optimization» more  GECCO 2008»
15 years 5 months ago
Evolutionary design of dynamic SwarmScapes
This paper discusses interactive evolutionary algorithms and their application in swarm-based image generation. From an artist’s perspective, the computer-generated patterns oļ¬...
Namrata Khemka, Scott Novakowski, Gerald Hushlak, ...
DATAMINE
2006
83views more  DATAMINE 2006»
15 years 4 months ago
Structural Hidden Markov Models Using a Relation of Equivalence: Application to Automotive Designs
Standard hidden Markov models (HMM's) have been studied extensively in the last two decades. It is well known that these models assume state conditional independence of the ob...
Djamel Bouchaffra, Jun Tan
IJNSEC
2007
119views more  IJNSEC 2007»
15 years 4 months ago
Evolutionary Design of Intrusion Detection Programs
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
Ajith Abraham, Crina Grosan, Carlos Martín-...