Sciweavers

813 search results - page 98 / 163
» Pipeline-centric provenance model
Sort
View
GECCO
2004
Springer
212views Optimization» more  GECCO 2004»
14 years 2 months ago
An Evolutionary Autonomous Agent with Visual Cortex and Recurrent Spiking Columnar Neural Network
Spiking neural networks are computationally more powerful than conventional artificial neural networks. Although this fact should make them especially desirable for use in evoluti...
Rich Drewes, James B. Maciokas, Sushil J. Louis, P...
IWQOS
2004
Springer
14 years 2 months ago
Network calculus meets queueing theory -a simulation based approach to bounded queues
— Quality of Service (QoS) is an area with high academic curiosity. Our long-term goal is to develop a unified mathematical model. This paper is a first step towards this ambit...
Krishna Pandit, Jens Schmitt, Ralf Steinmetz
SACRYPT
2004
Springer
105views Cryptology» more  SACRYPT 2004»
14 years 2 months ago
Provably Secure Masking of AES
A general method to secure cryptographic algorithm implementations against side-channel attacks is the use of randomization techniques and, in particular, masking. Roughly speaking...
Johannes Blömer, Jorge Guajardo, Volker Krumm...
CSB
2003
IEEE
14 years 2 months ago
Haplotype Motifs: An Algorithmic Approach to Locating Evolutionarily Conserved Patterns in Haploid Sequences
The promise of plentiful data on common human genetic variations has given hope that we will be able to uncover genetic factors behind common diseases that have proven difficult ...
Russell Schwartz
RTSS
2003
IEEE
14 years 2 months ago
A Dynamic Voltage Scaling Algorithm for Sporadic Tasks
Dynamic voltage scaling (DVS) algorithms save energy by scaling down the processor frequency when the processor is not fully loaded. Many algorithms have been proposed for periodi...
Ala' Qadi, Steve Goddard, Shane Farritor