Sciweavers

1585 search results - page 312 / 317
» Automatically optimizing secure computation
Sort
View
GECCO
2009
Springer
109views Optimization» more  GECCO 2009»
14 years 2 months ago
Canonical representation genetic programming
Search spaces sampled by the process of Genetic Programming often consist of programs which can represent a function in many different ways. Thus, when the space is examined it i...
John R. Woodward, Ruibin Bai
GECCO
2009
Springer
130views Optimization» more  GECCO 2009»
14 years 2 months ago
The impact of jointly evolving robot morphology and control on adaptation rate
Embodied cognition emphasizes that intelligent behavior results from the coupled dynamics between an agent’s body, brain and environment. In response to this, several projects h...
Josh C. Bongard
SMA
2009
ACM
149views Solid Modeling» more  SMA 2009»
14 years 2 months ago
A sketching interface for feature curve recovery of free-form surfaces
In this paper, we present a semi-automatic approach to efficiently and robustly recover the characteristic feature curves of a given free-form surface. The technique supports a s...
Ellen Dekkers, Leif Kobbelt, Richard R. Pawlicki, ...
BTW
2007
Springer
136views Database» more  BTW 2007»
14 years 1 months ago
System P: Completeness-driven Query Answering in Peer Data Management Systems
Abstract: Peer data management systems (PDMS) are a highly dynamic, decentralized infrastructure for large-scale data integration. They consist of a dynamic set of autonomous peers...
Armin Roth, Felix Naumann
EMSOFT
2007
Springer
14 years 1 months ago
A communication synthesis infrastructure for heterogeneous networked control systems and its application to building automation
In networked control systems the controller of a physicallydistributed plant is implemented as a collection of tightlyinteracting, concurrent processes running on a distributed ex...
Alessandro Pinto, Luca P. Carloni, Alberto L. Sang...