Sciweavers

453 search results - page 77 / 91
» Controllability analysis for current profile control in toka...
Sort
View
GECCO
2007
Springer
196views Optimization» more  GECCO 2007»
14 years 1 months ago
Optimal nesting of species for exact cover of resources: two against many
The application of resource-defined fitness sharing (RFS) to shape nesting problems reveals a remarkable ability to discover tilings [7, 8]. These tilings represent exact covers...
Jeffrey Horn
MICRO
1998
IEEE
144views Hardware» more  MICRO 1998»
13 years 12 months ago
Analyzing the Working Set Characteristics of Branch Execution
To achieve highly accurate branch prediction, it is necessary not only to allocate more resources to branch prediction hardware but also to improve the understanding of branch exe...
Sangwook P. Kim, Gary S. Tyson
PAMI
2008
183views more  PAMI 2008»
13 years 7 months ago
Shape-and-Behavior Encoded Tracking of Bee Dances
Behavior analysis of social insects has garnered impetus in recent years and has led to some advances in fields like control systems, flight navigation etc. Manual labeling of ins...
Ashok Veeraraghavan, Rama Chellappa, Mandyam Srini...
SAC
2009
ACM
14 years 2 months ago
Measuring coherence between electronic and manual annotations in biological databases
The use of controlled structured vocabularies for annotation purposes, such as the Gene Ontology (GO) is currently one of the strategies to cope with the increasingly cumbersome t...
Catia Pesquita, Daniel Faria, Francisco M. Couto
ISW
2007
Springer
14 years 1 months ago
Detecting System Emulators
Malware analysis is the process of determining the behavior and purpose of a given malware sample (such as a virus, worm, or Trojan horse). This process is a necessary step to be a...
Thomas Raffetseder, Christopher Krügel, Engin...