Sciweavers

569 search results - page 40 / 114
» Using Constraints for Exploring Catalogs
Sort
View
IEEECIT
2010
IEEE
13 years 5 months ago
SESAM: An MPSoC Simulation Environment for Dynamic Application Processing
Future systems will have to support multiple and concurrent dynamic compute-intensive applications, while respecting real-time and energy consumption constraints. With the increase...
Nicolas Ventroux, Alexandre Guerre, Tanguy Sassola...
GECCO
2007
Springer
185views Optimization» more  GECCO 2007»
14 years 1 months ago
Enhanced forma analysis of permutation problems
Forma analysis provides an approach to formally derive domain specific operators based on domain-independent operator templates by manipulating a set of equivalence relations (i....
Tao Gong, Andrew Tuson
HICSS
2003
IEEE
85views Biometrics» more  HICSS 2003»
14 years 1 months ago
Designs for Ramp-Constrained Day-Ahead Auctions
— Some electric power markets allow bidders to specify constraints on ramp rates for increasing or decreasing power production. We show in a small example that a bidder could use...
Shmuel S. Oren, Andrew M. Ross
CASCON
2006
98views Education» more  CASCON 2006»
13 years 9 months ago
A lightweight approach to state based security testing
State based protocols are protocols in which the handling of one message depends on the contents of previous messages. Testing such protocols, for security or for other purposes u...
Songtao Zhang, Thomas R. Dean, Scott Knight
INFOCOM
2007
IEEE
14 years 2 months ago
Using Channel Hopping to Increase 802.11 Resilience to Jamming Attacks
—802.11a, b, and g standards were designed for deployment in cooperative environments, and hence do not include mechanisms to protect from jamming attacks. In this paper, we expl...
Vishnu Navda, Aniruddha Bohra, Samrat Ganguly, Dan...