Sciweavers

6693 search results - page 1277 / 1339
» On an anytime algorithm for control
Sort
View
GECCO
2007
Springer
179views Optimization» more  GECCO 2007»
14 years 2 months ago
A destructive evolutionary process: a pilot implementation
This paper describes the application of evolutionary search to the problem of Flash memory wear-out. The operating parameters of Flash memory are notoriously difficult to determin...
Joe Sullivan, Conor Ryan
SSS
2007
Springer
121views Control Systems» more  SSS 2007»
14 years 2 months ago
Byzantine Self-stabilizing Pulse in a Bounded-Delay Model
Abstract. “Pulse Synchronization” intends to invoke a recurring distributed event at the different nodes, of a distributed system as simultaneously as possible and with a freq...
Danny Dolev, Ezra N. Hoch
COMSWARE
2006
IEEE
14 years 2 months ago
Architecture and framework for supporting open-access multi-user wireless experimentation
—Most of the contemporary research in wireless networks is primarily based on simulations or in-house small scale experimental setups that are highly customized for the experimen...
Sachin Ganu, Maximilian Ott, Ivan Seskar, Dipankar...
HPDC
2006
IEEE
14 years 2 months ago
Path Grammar Guided Trace Compression and Trace Approximation
Trace-driven simulation is an important technique used in the evaluation of computer architecture innovations. However using it for studying parallel computers and applications is...
Xiaofeng Gao, Allan Snavely, Larry Carter
ICDM
2006
IEEE
91views Data Mining» more  ICDM 2006»
14 years 2 months ago
Entropy-based Concept Shift Detection
When monitoring sensory data (e.g., from a wearable device) the context oftentimes changes abruptly: people move from one situation (e.g., working quietly in their office) to ano...
Peter Vorburger, Abraham Bernstein
« Prev « First page 1277 / 1339 Last » Next »