Sciweavers

353 search results - page 29 / 71
» The C Hackers Guide
Sort
View
AUTOMATICA
2000
72views more  AUTOMATICA 2000»
13 years 10 months ago
Direct iterative tuning via spectral analysis
This paper introduces a nonparametric frequency-domain scheme for tuning closed-loop systems. A linear quadratic criterion is used for guiding the system towards an optimal-regula...
Leonardo C. Kammer, Robert R. Bitmead, Peter L. Ba...
CCS
2010
ACM
13 years 9 months ago
Developing security protocols by refinement
We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides sformation of abstract security goals into protocols that are s...
Christoph Sprenger, David A. Basin
EVI
2010
94views more  EVI 2010»
13 years 5 months ago
Collective neuro-evolution for evolving specialized sensor resolutions in a multi-rover task
This article presents results from an evaluation of the collective neuro-evolution (CONE) controller design method. CONE solves collective behavior tasks, and increases task perfor...
Geoff S. Nitschke, Martijn C. Schut, A. E. Eiben
NAR
2010
107views more  NAR 2010»
13 years 5 months ago
NAPS: a residue-level nucleic acid-binding prediction server
Nucleic acid-binding proteins are involved in a great number of cellular processes. Understanding the mechanisms underlying these proteins first requires the identification of spe...
Matthew B. Carson, Robert E. Langlois, Hui Lu
ISCA
2009
IEEE
318views Hardware» more  ISCA 2009»
14 years 5 months ago
Thread criticality predictors for dynamic performance, power, and resource management in chip multiprocessors
With the shift towards chip multiprocessors (CMPs), exploiting and managing parallelism has become a central problem in computer systems. Many issues of parallelism management boi...
Abhishek Bhattacharjee, Margaret Martonosi