Sciweavers

356 search results - page 17 / 72
» Evolutionary Computing and Autonomic Computing: Shared Probl...
Sort
View
GECCO
2007
Springer
180views Optimization» more  GECCO 2007»
14 years 3 months ago
Exploiting multiple robots to accelerate self-modeling
In previous work [8] a computational framework was demonstrated that allows a mobile robot to autonomously evolve models its own body for the purposes of adaptive behavior generat...
Josh C. Bongard
ISSADS
2005
Springer
14 years 2 months ago
Database System Architecture - A Walk Through Time: From Centralized Platform to Mobile Computing - Keynote Address
Classical distributed database systems monolithically offer distribution transparency and higher performance. This is made possible by making data available and closer to the appl...
Ali R. Hurson, Yu Jiao
IPPS
2010
IEEE
13 years 7 months ago
A PRAM-NUMA model of computation for addressing low-TLP workloads
It is possible to implement the parallel random access machine (PRAM) on a chip multiprocessor (CMP) efficiently with an emulated shared memory (ESM) architecture to gain easy par...
Martti Forsell
TEC
2002
161views more  TEC 2002»
13 years 9 months ago
A fast and elitist multiobjective genetic algorithm: NSGA-II
Multiobjective evolutionary algorithms (EAs) that use nondominated sorting and sharing have been criticized mainly for their: 1) ( 3) computational complexity (where is the number ...
Kalyanmoy Deb, Samir Agrawal, Amrit Pratap, T. Mey...
FC
2010
Springer
196views Cryptology» more  FC 2010»
13 years 10 months ago
Secure Computation with Fixed-Point Numbers
Abstract. Secure computation is a promising approach to business problems in which several parties want to run a joint application and cannot reveal their inputs. Secure computatio...
Octavian Catrina, Amitabh Saxena