Sciweavers

12478 search results - page 2433 / 2496
» Secure Interaction Design
Sort
View
143
Voted
GECCO
2007
Springer
151views Optimization» more  GECCO 2007»
15 years 8 months ago
Solving real-valued optimisation problems using cartesian genetic programming
Classical Evolutionary Programming (CEP) and Fast Evolutionary Programming (FEP) have been applied to realvalued function optimisation. Both of these techniques directly evolve th...
James Alfred Walker, Julian Francis Miller
112
Voted
GECCO
2007
Springer
138views Optimization» more  GECCO 2007»
15 years 8 months ago
Unwitting distributed genetic programming via asynchronous JavaScript and XML
The success of a genetic programming system in solving a problem is often a function of the available computational resources. For many problems, the larger the population size an...
Jon Klein, Lee Spector
139
Voted
LCTRTS
2007
Springer
15 years 8 months ago
Enabling compiler flow for embedded VLIW DSP processors with distributed register files
High-performance and low-power VLIW DSP processors are increasingly deployed on embedded devices to process video and multimedia applications. For reducing power and cost in desig...
Chung-Kai Chen, Ling-Hua Tseng, Shih-Chang Chen, Y...
119
Voted
ACSC
2006
IEEE
15 years 8 months ago
SPiKE: engineering malware analysis tools using unobtrusive binary-instrumentation
Malware — a generic term that encompasses viruses, trojans, spywares and other intrusive code — is widespread today. Malware analysis is a multi-step process providing insight...
Amit Vasudevan, Ramesh Yerraballi
107
Voted
AUIC
2006
IEEE
15 years 8 months ago
Patternprogrammer: yet another rule-based programming environment for children
Graphical rewrite rules are often used in programming environments for children. These rules consist of two parts: a left-hand side, which is visually matched in the environment, ...
Tim Wright
« Prev « First page 2433 / 2496 Last » Next »