Sciweavers

106 search results - page 20 / 22
» Explicit and Implicit Enforcing - Randomized Optimization
Sort
View
ISCA
1996
IEEE
130views Hardware» more  ISCA 1996»
13 years 11 months ago
Informing Memory Operations: Providing Memory Performance Feedback in Modern Processors
Memory latency is an important bottleneck in system performance that cannot be adequately solved by hardware alone. Several promising software techniques have been shown to addres...
Mark Horowitz, Margaret Martonosi, Todd C. Mowry, ...
ATAL
2003
Springer
14 years 19 days ago
Providing Effective Access to Shared Resources: A COIN Approach
Managers of systems of shared resources typically have many separate goals. Examples are efficient utilization of the resources among its users and ensuring no user’s satisfacti...
Stéphane Airiau, Sandip Sen, David Wolpert,...
GECCO
2010
Springer
173views Optimization» more  GECCO 2010»
14 years 6 days ago
Evolving the placement and density of neurons in the hyperneat substrate
The Hypercube-based NeuroEvolution of Augmenting Topologies (HyperNEAT) approach demonstrated that the pattern of weights across the connectivity of an artificial neural network ...
Sebastian Risi, Joel Lehman, Kenneth O. Stanley
RR
2010
Springer
13 years 5 months ago
Query-Based Access Control for Ontologies
Role-based access control is a standard mechanism in information systems. Based on the role a user has, certain information is kept from the user even if requested. For ontologies ...
Martin Knechtel, Heiner Stuckenschmidt
ICFP
2006
ACM
14 years 7 months ago
Extensible programming with first-class cases
We present language mechanisms for polymorphic, extensible records and their exact dual, polymorphic sums with extensible first-class cases. These features make it possible to eas...
Matthias Blume, Umut A. Acar, Wonseok Chae