Sciweavers

1176 search results - page 199 / 236
» Theory and Applications of Robust Optimization
Sort
View
GECCO
2007
Springer
163views Optimization» more  GECCO 2007»
15 years 6 months ago
Action-selection and crossover strategies for self-modeling machines
In previous work [7] a computational framework was demonstrated that employs evolutionary algorithms to automatically model a given system. This is accomplished by alternating the...
Josh C. Bongard
MICRO
2005
IEEE
117views Hardware» more  MICRO 2005»
15 years 5 months ago
A Quantum Logic Array Microarchitecture: Scalable Quantum Data Movement and Computation
Recent experimental advances have demonstrated technologies capable of supporting scalable quantum computation. A critical next step is how to put those technologies together into...
Tzvetan S. Metodi, Darshan D. Thaker, Andrew W. Cr...
SIGECOM
2005
ACM
90views ECommerce» more  SIGECOM 2005»
15 years 5 months ago
ICE: an iterative combinatorial exchange
We present the first design for a fully expressive iterative combinatorial exchange (ICE). The exchange incorporates a tree-based bidding language that is concise and expressive ...
David C. Parkes, Ruggiero Cavallo, Nick Elprin, Ad...
GECCO
2005
Springer
193views Optimization» more  GECCO 2005»
15 years 5 months ago
On the contribution of gene libraries to artificial immune systems
Gene libraries have been added to Artificial Immune Systems in analogy to biological immune systems, but to date no careful study of their effect has been made. This work investig...
Peter Spellward, Tim Kovacs
MM
2004
ACM
109views Multimedia» more  MM 2004»
15 years 5 months ago
Loss-resilient on-demand media streaming using priority encoding
A novel solution to the reliable multicast problem is the “digital fountain” approach, in which data is encoded with an erasure protection code before transmission, and receiv...
Cheng Huang, Ramaprabhu Janakiraman, Lihao Xu