Sciweavers

2961 search results - page 378 / 593
» Optimization of tele-immersion codes
Sort
View
GECCO
2005
Springer
232views Optimization» more  GECCO 2005»
15 years 9 months ago
Factorial representations to generate arbitrary search distributions
A powerful approach to search is to try to learn a distribution of good solutions (in particular of the dependencies between their variables) and use this distribution as a basis ...
Marc Toussaint
ISI
2005
Springer
15 years 9 months ago
Performance Study of a Compiler/Hardware Approach to Embedded Systems Security
Abstract. Trusted software execution, prevention of code and data tampering, authentication, and providing a secure environment for software are some of the most important security...
Kripashankar Mohan, Bhagirath Narahari, Rahul Simh...
WAC
2005
Springer
118views Communications» more  WAC 2005»
15 years 9 months ago
Experiments on the Automatic Evolution of Protocols Using Genetic Programming
Truly autonomic networks ultimately require self-modifying, evolving protocol software. Otherwise humans must intervene in every situation that has not been anticipated at design t...
Lidia Yamamoto, Christian F. Tschudin
116
Voted
GECCO
2004
Springer
15 years 9 months ago
Using Interconnection Style Rules to Infer Software Architecture Relations
Software design techniques emphasize the use of abstractions to help developers deal with the complexity of constructing large and complex systems. These abstractions can also be u...
Brian S. Mitchell, Spiros Mancoridis, Martin Trave...
ECCV
2010
Springer
15 years 9 months ago
Programmable Aperture Camera Using LCoS
Since 1960s, aperture patterns have been studied extensively and a variety of coded apertures have been proposed for various applications, including extended depth of field, defocu...
Hajime Nagahara, Changyin Zhou, Takuya Watanabe, H...