Sciweavers

2292 search results - page 330 / 459
» Techniques and tools for dynamic optimization
Sort
View
GECCO
2004
Springer
121views Optimization» more  GECCO 2004»
14 years 1 months ago
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the des...
Gerry V. Dozier, Douglas Brown, John Hurley, Kryst...
CASES
2003
ACM
14 years 1 months ago
Graphical user interface energy characterization for handheld computers
A significant fraction of the software and resource usage of a modern handheld computer is devoted to its graphical user interface (GUI). Moreover, GUIs are direct users of the d...
Lin Zhong, Niraj K. Jha
ISCAS
1999
IEEE
106views Hardware» more  ISCAS 1999»
14 years 18 days ago
Multi-objective design strategy for high-level low power design of DSP systems
High-level power design presents a complex, multiobjective problem that involves the simultaneous optimisation of competing criteria such as speed, area and power. It is difficult...
Mark S. Bright, Tughrul Arslan
ICCAD
1997
IEEE
117views Hardware» more  ICCAD 1997»
14 years 16 days ago
Generalized matching from theory to application
This paper presents a novel approach for post-mapping optimization. We exploit the concept of generalized matching, a technique that nds symbolically all possible matching assignm...
Patrick Vuillod, Luca Benini, Giovanni De Micheli
VLDB
1998
ACM
82views Database» more  VLDB 1998»
14 years 16 days ago
Reducing the Braking Distance of an SQL Query Engine
In a recent paper, we proposed adding a STOP AFTER clause to SQL to permit the cardinality of a query result to be explicitly limited by query writers and query tools. We demonstr...
Michael J. Carey, Donald Kossmann