Sciweavers

497 search results - page 69 / 100
» Privacy Enhanced Technologies: Methods - Markets - Misuse
Sort
View
OOPSLA
2004
Springer
15 years 9 months ago
The garbage collection advantage: improving program locality
As improvements in processor speed continue to outpace improvements in cache and memory speed, poor locality increasingly degrades performance. Because copying garbage collectors ...
Xianglong Huang, Stephen M. Blackburn, Kathryn S. ...
KES
2005
Springer
15 years 9 months ago
Zero-Based Code Modulation Technique for Digital Video Fingerprinting
Digital fingerprinting is a technique to protect digital contents from illegal reproduction and redistribution by marking unique information for individual user. A powerful but sim...
In Koo Kang, Hae-Yeoun Lee, Won-Young Yoo, Heung-K...
GECCO
2010
Springer
157views Optimization» more  GECCO 2010»
15 years 7 months ago
Speeding up the evaluation of evolutionary learning systems using GPGPUs
In this paper we introduce a method for computing fitness in evolutionary learning systems based on NVIDIA’s massive parallel technology using the CUDA library. Both the match ...
María A. Franco, Natalio Krasnogor, Jaume B...
WSC
2000
15 years 5 months ago
Simply Simulation: an interactive CD-ROM-based approach for learning simulation concepts
The purpose of this paper is to introduce a new approach to teaching an introductory simulation course using an interactive CD-ROM titled "Simply Simulation". This metho...
Connie Nott, Graham Nott, C. Christopher Lee
RAM
2008
IEEE
137views Robotics» more  RAM 2008»
15 years 10 months ago
Middleware for Robotics: A Survey
—The field of robotics relies heavily on various technologies such as mechatronics, computing systems, and wireless communication. Given the fast growing technological progress i...
Nader Mohamed, Jameela Al-Jaroodi, Imad Jawhar