Sciweavers

2595 search results - page 226 / 519
» Addressing Computational Viewpoint Design
Sort
View
ICS
2009
Tsinghua U.
15 years 9 months ago
Cancellation of loads that return zero using zero-value caches
The speed gap between processor and memory continues to limit performance. To address this problem, we explore the potential of eliminating Zero Loads—loads accessing memory loc...
Md. Mafijul Islam, Sally A. McKee, Per Stenstr&oum...
111
Voted
ICDCS
2008
IEEE
15 years 9 months ago
Sensor Node Localization Using Uncontrolled Events
Many event-driven localization methods have been proposed as low cost, energy efficient solutions for wireless senor networks. In order to eliminate the requirement of accurately...
Ziguo Zhong, Dan Wang, Tian He
122
Voted
CEC
2007
IEEE
15 years 8 months ago
Non-separable fitness functions for evolutionary shape optimization benchmarking
—Target shape matching can be used as a quick and easy surrogate task when evaluating optimization algorithms intended for computationally expensive tasks, such as turbine blade ...
Tim A. Yates, Thorsten Schnier
SOFSEM
2007
Springer
15 years 8 months ago
Personalized Presentation in Web-Based Information Systems
Abstract. Large information spaces and complex functionality of contemporary systems together with the advent of the Semantic Web are big challenges for the design of simple yet po...
Michal Tvarozek, Michal Barla, Mária Bielik...
DASC
2006
IEEE
15 years 8 months ago
On Recognizing Virtual Honeypots and Countermeasures
— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin St...