Sciweavers

1136 search results - page 187 / 228
» Functional Validation in Grid Computing
Sort
View
GECCO
2007
Springer
161views Optimization» more  GECCO 2007»
14 years 4 months ago
Alternative techniques to solve hard multi-objective optimization problems
In this paper, we propose the combination of different optimization techniques in order to solve “hard” two- and threeobjective optimization problems at a relatively low comp...
Ricardo Landa Becerra, Carlos A. Coello Coello, Al...
IH
2007
Springer
14 years 4 months ago
Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection
Abstract. We introduce software integrity checking expressions (SoftICEs), which are program predicates that can be used in software tamper detection. We present two candidates, pr...
Mariusz H. Jakubowski, Prasad Naldurg, Vijay Patan...
AICCSA
2006
IEEE
143views Hardware» more  AICCSA 2006»
14 years 4 months ago
An Innovative Self-Configuration Approach for Networked Systems and Applications
The increased complexity, heterogeneity and the dynamism of networked systems and services make current control and management tools to be ineffective in managing and securing suc...
Huoping Chen, Salim Hariri, Fahd Rasul
CODES
2006
IEEE
14 years 4 months ago
TLM/network design space exploration for networked embedded systems
This paper presents a methodology to combine Transaction Level Modeling and System/Network co-simulation for the design of networked embedded systems. As a result, a new design di...
Nicola Bombieri, Franco Fummi, Davide Quaglia
VTC
2006
IEEE
114views Communications» more  VTC 2006»
14 years 4 months ago
Channel Capacity of BLAST based on the Zero-Forcing criterion
In this paper, we present an asymptotical analysis of channel capacity of Bell labs layered space-time (BLAST) architectures based on a zero-forcing (ZF) criterion in the sense of...
Heunchul Lee, Inkyu Lee