Sciweavers

3579 search results - page 598 / 716
» Transformations of software models into performance models
Sort
View
GECCO
2004
Springer
212views Optimization» more  GECCO 2004»
15 years 9 months ago
An Evolutionary Autonomous Agent with Visual Cortex and Recurrent Spiking Columnar Neural Network
Spiking neural networks are computationally more powerful than conventional artificial neural networks. Although this fact should make them especially desirable for use in evoluti...
Rich Drewes, James B. Maciokas, Sushil J. Louis, P...
137
Voted
HICSS
2003
IEEE
202views Biometrics» more  HICSS 2003»
15 years 9 months ago
Automated Coaching of Collaboration Based on Workspace Analysis: Evaluation and Implications for Future Learning Environments
This paper describes the design and evaluation of COLER, a computer mediated learning environment that includes a software coach to help students collaborate while solving Entity ...
María de los Angeles Constantino-Gonz&aacut...
145
Voted
FSTTCS
2003
Springer
15 years 9 months ago
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol
We prove the Needham-Schroeder-Lowe public-key protocol secure under real, active cryptographic attacks including concurrent protocol runs. This proof is based on an abstract crypt...
Michael Backes, Birgit Pfitzmann
132
Voted
IPPS
1996
IEEE
15 years 8 months ago
Dag-Consistent Distributed Shared Memory
We introduce dag consistency, a relaxed consistency model for distributed shared memory which is suitable for multithreaded programming. We have implemented dag consistency in sof...
Robert D. Blumofe, Matteo Frigo, Christopher F. Jo...
ANSS
2004
IEEE
15 years 8 months ago
Cache Simulation Based on Runtime Instrumentation for OpenMP Applications
To enable optimizations in memory access behavior of high performance applications, cache monitoring is a crucial process. Simulation of cache hardware is needed in order to allow...
Jie Tao, Josef Weidendorfer