Sciweavers

1207 search results - page 86 / 242
» Towards optimal k-anonymization
Sort
View
87
Voted
MICRO
2006
IEEE
155views Hardware» more  MICRO 2006»
15 years 6 months ago
In-Network Cache Coherence
With the trend towards increasing number of processor cores in future chip architectures, scalable directory-based protocols for maintaining cache coherence will be needed. Howeve...
Noel Eisley, Li-Shiuan Peh, Li Shang
DATE
2002
IEEE
105views Hardware» more  DATE 2002»
15 years 5 months ago
Power-Manageable Scheduling Technique for Control Dominated High-Level Synthesis
Optimizing power consumption at high-level is a critical step towards power-efficient digital system designs. This paper addresses the power management problem by scheduling a giv...
Chunhong Chen, Majid Sarrafzadeh
93
Voted
CDC
2009
IEEE
106views Control Systems» more  CDC 2009»
15 years 5 months ago
Gradient methods for iterative distributed control synthesis
— In this paper we present a gradient method to iteratively update local controllers of a distributed linear system driven by stochastic disturbances. The control objective is to...
Karl Martensson, Anders Rantzer
109
Voted
GECCO
2009
Springer
146views Optimization» more  GECCO 2009»
15 years 4 months ago
Evolving specific network statistical properties using a gene regulatory network model
Abstract. The generation of network topologies with specific, userspecified statistical properties is the aim of this paper. This is achieved through the use of an artifical Gene R...
Miguel Nicolau, Marc Schoenauer
108
Voted
GECCO
2006
Springer
143views Optimization» more  GECCO 2006»
15 years 4 months ago
The correlation-triggered adaptive variance scaling IDEA
It has previously been shown analytically and experimentally that continuous Estimation of Distribution Algorithms (EDAs) based on the normal pdf can easily suffer from premature ...
Jörn Grahl, Peter A. N. Bosman, Franz Rothlau...