Sciweavers

797 search results - page 88 / 160
» MODULA-2 and Its Compilation
Sort
View
ISCAS
2006
IEEE
114views Hardware» more  ISCAS 2006»
15 years 10 months ago
System for deposition and characterization of polypyrrole/gold bilayer hinges
— We report on a custom designed system for the deposition and characterization of polypyrrole bilayer actuators. Unlike conventional commercial electrochemical cells and potenti...
Edward Choi, Yingkai Liu, Elisabeth Smela, Andreas...
CODES
2005
IEEE
15 years 10 months ago
Enhanced code density of embedded CISC processors with echo technology
Code density is an important issue in memory constrained systems. Some RISC processor, e.g. the THUMB extension in the ARM processor, supports aggressive code size reduction even ...
Youfeng Wu, Mauricio Breternitz Jr., Herbert H. J....
GECCO
2005
Springer
145views Optimization» more  GECCO 2005»
15 years 10 months ago
Evolving an ecology of two-tiered organizations
Evolutionary models typically rely on a single level of evolution for training a team of cooperating agents. I present a model that evolves at two levels—an “organizational”...
Travis Kriplean
LOPSTR
2005
Springer
15 years 10 months ago
An Algorithm for Local Variable Elimination in Normal Logic Programs
A variable is local if it occurs in a clause body but not in its head. Local variables appear naturally in practical logic programming, but they complicate several aspects such as ...
Javier Álvez, Paqui Lucio
TGC
2005
Springer
15 years 10 months ago
Programming Cryptographic Protocols
Cryptographic protocols are useful for trust engineering in distributed transactions. Transactions require specific degrees of confidentiality and agreement between the principal...
Joshua D. Guttman, Jonathan C. Herzog, John D. Ram...