Login / Signup

Multi-objective artificial immune algorithm for security-constrained multi-application NoC mapping.

Martha Johanna SepúlvedaJiang Chau WangMarius StrumCésar PedrazaGuy GogniatRicardo Pires
Published in: GECCO (Companion) (2012)
Keyphrases
  • multi objective
  • artificial immune algorithm
  • optimization algorithm
  • neural network
  • multi objective optimization
  • case study
  • security issues
  • genetic algorithm
  • access control