Sciweavers

424 search results - page 66 / 85
» Optimizing Resource Utilization Using Transformations
Sort
View
WSC
2008
14 years 11 days ago
Yard crane dispatching based on real time data driven simulation for container terminals
This paper studies the problem of real time yard crane dispatching in container terminals. Many technologies, including transponders, RFID and GPS have been used in the container ...
Xi Guo, Shell-Ying Huang, Wen-Jing Hsu, Malcolm Yo...
DICTA
2008
13 years 11 months ago
Texture Descriptors via Stable Distributions
In this paper, we present a texture descriptor which hinges in the use of the local image statistics so as to recover a compact representation of the texture under study. To this ...
Pattaraporn Khuwuthyakorn, Antonio Robles-Kelly, J...
MICRO
2005
IEEE
130views Hardware» more  MICRO 2005»
14 years 3 months ago
Exploiting Vector Parallelism in Software Pipelined Loops
An emerging trend in processor design is the addition of short vector instructions to general-purpose and embedded ISAs. Frequently, these extensions are employed using traditiona...
Samuel Larsen, Rodric M. Rabbah, Saman P. Amarasin...
TON
2012
12 years 15 days ago
Scalable Lookahead Regular Expression Detection System for Deep Packet Inspection
—Regular expressions (RegExes) are widely used, yet their inherent complexity often limits the total number of RegExes that can be detected using a single chip for a reasonable t...
Masanori Bando, N. Sertac Artan, H. Jonathan Chao
GECCO
2009
Springer
131views Optimization» more  GECCO 2009»
13 years 7 months ago
A multi-objective approach to data sharing with privacy constraints and preference based objectives
Public data sharing is utilized in a number of businesses to facilitate the exchange of information. Privacy constraints are usually enforced to prevent unwanted inference of info...
Rinku Dewri, Darrell Whitley, Indrajit Ray, Indrak...