Author of the publication

Metaoptimization of the in-lining priority function for a compiler targeting a polymorphous computing architecture.

. GECCO (Companion), page 1921-1928. ACM, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Implementation of a Minuscule General Purpose Processor in an Undergraduate Computer Architecture Course., , and . MSE, page 43-44. IEEE Computer Society, (2007)Metaoptimization of the in-lining priority function for a compiler targeting a polymorphous computing architecture.. GECCO (Companion), page 1921-1928. ACM, (2008)Underwater Hacker Missile Wars: A Cryptography and Engineering Contest., , , and . Cryptologia, 30 (1): 69-77 (2006)Design optimization for a novel class of high power microwave sources., and . IEEE Congress on Evolutionary Computation, page 1732-1739. IEEE, (2003)Cyberspace Odyssey: A Competitive Team-Oriented Serious Game in Computer Networking., , , , , , , and . IEEE Trans. Learn. Technol., 13 (3): 502-515 (2020)Hybrid genetic algorithms for polypeptide energy minimization., , , , and . SAC, page 305-311. ACM, (1996)An initial analysis of data parallelism in the fast messy genetic algorithm., and . SAC, page 488-492. ACM, (1994)Automated network forensics.. GECCO (Companion), page 1929-1932. ACM, (2008)Management challenges in a large introductory computer science course., and . SIGCSE, page 252-256. ACM, (2002)Measuring the effectiveness of robots in teaching computer science., and . SIGCSE, page 307-311. ACM, (2003)