Sciweavers

5344 search results - page 84 / 1069
» Privacy-Preserving Set Operations
Sort
View
INFOCOM
2010
IEEE
13 years 8 months ago
UUSee: Large-Scale Operational On-Demand Streaming with Random Network Coding
—Since the inception of network coding in information theory, we have witnessed a sharp increase of research interest in its applications in communications and networking, where ...
Zimu Liu, Chuan Wu, Baochun Li, Shuqiao Zhao
CEC
2009
IEEE
14 years 4 months ago
Differential Evolution with Laplace mutation operator
— Differential Evolution (DE) is a novel evolutionary approach capable of handling non-differentiable, non-linear and multi-modal objective functions. DE has been consistently ra...
Millie Pant, Radha Thangaraj, Ajith Abraham, Crina...
CEC
2008
IEEE
14 years 4 months ago
On the generality of the evolved driving rules of an agent operating a model of a car
—We present an approach for automated evolutionary design of the functionary of driving agent, able to operate a software model of fast running car. The objective of our work is ...
Hirotaka Yamazaki, Ivan Tanev, Tomoyuki Hiroyasu, ...
DATE
2008
IEEE
114views Hardware» more  DATE 2008»
14 years 4 months ago
Operating System Controlled Processor-Memory Bus Encryption
—Unencrypted data appearing on the processor– memory bus can result in security violations, e.g., allowing attackers to gather keys to financial accounts and personal data. Al...
Xi Chen, Robert P. Dick, Alok N. Choudhary
RTSS
2007
IEEE
14 years 4 months ago
Implementing Hybrid Operating Systems with Two-Level Hardware Interrupts
In this paper, we propose to implement hybrid operating systems based on two-level hardware interrupts. To separate real-time and non-real-time hardware interrupts by hardware, we...
Miao Liu, Zili Shao, Meng Wang, Hongxing Wei, Tian...