Sciweavers

2048 search results - page 331 / 410
» Optimizing pipelines for power and performance
Sort
View
FDTC
2006
Springer
74views Cryptology» more  FDTC 2006»
13 years 11 months ago
Fault Attack Resistant Cryptographic Hardware with Uniform Error Detection
Traditional hardware error detection methods based on linear codes make assumptions about the typical or expected errors and faults and concentrate the detection power towards the ...
Konrad J. Kulikowski, Mark G. Karpovsky, Alexander...
GECCO
2010
Springer
140views Optimization» more  GECCO 2010»
13 years 10 months ago
Investigating the impact of sequential selection in the (1, 4)-CMA-ES on the noiseless BBOB-2010 testbed
This paper investigates the impact of sequential selection, a concept recently introduced for Evolution Strategies (ESs). Sequential selection performs the evaluations of the diï¬...
Anne Auger, Dimo Brockhoff, Nikolaus Hansen
ECAI
2008
Springer
13 years 9 months ago
Structure Learning of Markov Logic Networks through Iterated Local Search
Many real-world applications of AI require both probability and first-order logic to deal with uncertainty and structural complexity. Logical AI has focused mainly on handling com...
Marenglen Biba, Stefano Ferilli, Floriana Esposito
MVA
2007
196views Computer Vision» more  MVA 2007»
13 years 9 months ago
Fingerprint Verification Using Perturbation Method
This paper describes a new, powerful technique of fingerprint verification based on a perturbation method. The proposed method consists of four parts. The first part performs loca...
Satoshi Otaka, Yoshihisa Nishiyama, Takahiro Hatan...
ASAP
2010
IEEE
185views Hardware» more  ASAP 2010»
13 years 8 months ago
ImpEDE: A multidimensional design-space exploration framework for biomedical-implant processors
Abstract—The demand for biomedical implants keeps increasing. However, most of the current implant design methodologies involve custom-ASIC design. The SiMS project aims to chang...
Dhara Dave, Christos Strydis, Georgi Gaydadjiev