Sciweavers

3146 search results - page 584 / 630
» The use of compiler optimizations for embedded systems softw...
Sort
View
GECCO
2009
Springer
161views Optimization» more  GECCO 2009»
15 years 11 months ago
Are evolutionary rule learning algorithms appropriate for malware detection?
In this paper, we evaluate the performance of ten well-known evolutionary and non-evolutionary rule learning algorithms. The comparative study is performed on a real-world classiï...
M. Zubair Shafiq, S. Momina Tabish, Muddassar Faro...
CODES
2005
IEEE
15 years 10 months ago
FlexPath NP: a network processor concept with application-driven flexible processing paths
In this paper, we present a new architectural concept for network processors called FlexPath NP. The central idea behind FlexPath NP is to systematically map network processor (NP...
Rainer Ohlendorf, Andreas Herkersdorf, Thomas Wild
EDBTW
2006
Springer
15 years 8 months ago
Window Specification over Data Streams
Several query languages have been proposed for managing data streams in modern monitoring applications. Continuous queries expressed in these languages usually employ windowing con...
Kostas Patroumpas, Timos K. Sellis
CC
2010
Springer
118views System Software» more  CC 2010»
15 years 2 months ago
Unrestricted Code Motion: A Program Representation and Transformation Algorithms Based on Future Values
Abstract. We introduce the concept of future values. Using future values it is possible to represent programs in a new control-flow form such that on any control flow path the data...
Shuhan Ding, Soner Önder
CC
2010
Springer
282views System Software» more  CC 2010»
15 years 2 months ago
Lower Bounds on the Randomized Communication Complexity of Read-Once Functions
Abstract. We prove lower bounds on the randomized two-party communication complexity of functions that arise from read-once boolean formulae. A read-once boolean formula is a formu...
Nikos Leonardos, Michael Saks