Sciweavers

11488 search results - page 2138 / 2298
» Robust optimization - methodology and applications
Sort
View
CODES
2004
IEEE
14 years 1 months ago
Operation tables for scheduling in the presence of incomplete bypassing
Register bypassing is a powerful and widely used feature in modern processors to eliminate certain data hazards. Although complete bypassing is ideal for performance, bypassing ha...
Aviral Shrivastava, Eugene Earlie, Nikil D. Dutt, ...
GECCO
2006
Springer
154views Optimization» more  GECCO 2006»
14 years 1 months ago
Emergent mating topologies in spatially structured genetic algorithms
The application of network analysis to emergent mating topologies in spatially structured genetic algorithms is presented in this preliminary study as a framework for inferring ev...
Joshua L. Payne, Margaret J. Eppstein
GECCO
2006
Springer
198views Optimization» more  GECCO 2006»
14 years 1 months ago
Reward allotment in an event-driven hybrid learning classifier system for online soccer games
This paper describes our study into the concept of using rewards in a classifier system applied to the acquisition of decision-making algorithms for agents in a soccer game. Our a...
Yuji Sato, Yosuke Akatsuka, Takenori Nishizono
ISMIR
2000
Springer
168views Music» more  ISMIR 2000»
14 years 1 months ago
Mel Frequency Cepstral Coefficients for Music Modeling
We examine in some detail Mel Frequency Cepstral Coefficients (MFCCs) - the dominant features used for speech recognition - and investigate their applicability to modeling music. ...
Beth Logan
GECCO
2010
Springer
192views Optimization» more  GECCO 2010»
14 years 1 months ago
Resource abundance promotes the evolution of public goods cooperation
Understanding the evolution of cooperation as part of an evolutionary stable strategy (ESS) is a difficult problem that has been the focus of much work. The associated costs of co...
Brian D. Connelly, Benjamin E. Beckmann, Philip K....
« Prev « First page 2138 / 2298 Last » Next »