Sciweavers

1585 search results - page 121 / 317
» Automatically optimizing secure computation
Sort
View
GECCO
2007
Springer
212views Optimization» more  GECCO 2007»
14 years 2 months ago
A developmental model of neural computation using cartesian genetic programming
The brain has long been seen as a powerful analogy from which novel computational techniques could be devised. However, most artificial neural network approaches have ignored the...
Gul Muhammad Khan, Julian F. Miller, David M. Hall...
ICS
2007
Tsinghua U.
14 years 2 months ago
Scheduling FFT computation on SMP and multicore systems
Increased complexity of memory systems to ameliorate the gap between the speed of processors and memory has made it increasingly harder for compilers to optimize an arbitrary code...
Ayaz Ali, S. Lennart Johnsson, Jaspal Subhlok
ASPLOS
2011
ACM
12 years 11 months ago
Mementos: system support for long-running computation on RFID-scale devices
Transiently powered computing devices such as RFID tags, kinetic energy harvesters, and smart cards typically rely on programs that complete a task under tight time constraints be...
Benjamin Ransford, Jacob Sorber, Kevin Fu
CERA
2002
201views more  CERA 2002»
13 years 7 months ago
CAD-Based Shape Optimization Using a Meshfree Method
: A shape design sensitivity analysis and optimization procedure is proposed using a meshfree method. A CAD tool connection is established to facilitate the seamless integration of...
Iulian Grindeanu, Nam Ho Kim, Kung K. Choi, Jiun-S...
ICCS
2005
Springer
14 years 1 months ago
Performance and Scalability Analysis of Cray X1 Vectorization and Multistreaming Optimization
Cray X1 Fortran and C/C++ compilers provide a number of loop transformations, notably vectorization and multistreaming, in order to exploit the multistreaming processor (MSP) hard...
Sadaf R. Alam, Jeffrey S. Vetter