Sciweavers

1448 search results - page 25 / 290
» Restricted Stack Implementations
Sort
View
ISCAS
2005
IEEE
147views Hardware» more  ISCAS 2005»
14 years 1 months ago
A heuristic approach for multiple restricted multiplication
— This paper introduces a heuristic solution to the multiple restricted multiplication (MRM) optimization problem. MRM refers to a situation where a single variable is multiplied...
Nalin Sidahao, George A. Constantinides, Peter Y. ...
ACSAC
2002
IEEE
14 years 15 days ago
Throttling Viruses: Restricting propagation to defeat malicious mobile code
Modern computer viruses spread incredibly quickly, far faster than human-mediated responses. This greatly increases the damage that they cause. This paper presents an approach to ...
Matthew M. Williamson
ANNS
2010
13 years 2 months ago
Search Space Restriction of Neuro-evolution through Constrained Modularization of Neural Networks
Evolving recurrent neural networks for behavior control of robots equipped with larger sets of sensors and actuators is difficult due to the large search spaces that come with the ...
Christian W. Rempis, Frank Pasemann
FOCS
2005
IEEE
14 years 1 months ago
Linear Lower Bounds on Real-World Implementations of Concurrent Objects
This paper proves   ¡ £ ¥ lower bounds on the time to perform a single instance of an operation in any implementation of a large class of data structures shared by £ processe...
Faith Ellen Fich, Danny Hendler, Nir Shavit
CORR
2010
Springer
83views Education» more  CORR 2010»
13 years 7 months ago
A Platform for Implementing Secure Wireless Ad Hoc Networks
: We propose a new platform for implementing secure wireless ad hoc networks. Our proposal is based on a modular architecture, with the software stack constructed directly on the E...
Gyula Farkas, Béla Genge, Piroska Haller