<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462018000300985</article-id>
<article-id pub-id-type="doi">10.13053/cys-22-3-2565</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Adaptive Algorithm Based on Renyi&#8217;s Entropy for Task Mapping in a Hierarchical Wireless Network-on-Chip Architecture]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Sacanamboy]]></surname>
<given-names><![CDATA[Maribell]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
<xref ref-type="aff" rid="Aaf"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Bolaños]]></surname>
<given-names><![CDATA[Freddy]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Bernal]]></surname>
<given-names><![CDATA[Alvaro]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Pontificia Universidad Javeriana Electronics and Computer Sciences Department ]]></institution>
<addr-line><![CDATA[Cali ]]></addr-line>
<country>Colombia</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Universidad Nacional de Colombia Electrical Energy and Automation Department ]]></institution>
<addr-line><![CDATA[Medellín ]]></addr-line>
<country>Colombia</country>
</aff>
<aff id="Af3">
<institution><![CDATA[,Universidad del Valle Electrical and Electronics Engineering School ]]></institution>
<addr-line><![CDATA[Cali ]]></addr-line>
<country>Colombia</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>09</month>
<year>2018</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>09</month>
<year>2018</year>
</pub-date>
<volume>22</volume>
<numero>3</numero>
<fpage>985</fpage>
<lpage>996</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462018000300985&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462018000300985&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462018000300985&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: This paper describes the use of Renyi&#8217;s entropy as a way to improve the convergence time of the Population-Based Incremental Learning (PBIL) optimization algorithm. As a case study, the algorithm was used in a hierarchical wireless network-on-chip (WiNoC) for the sake of performing the optimal task mapping of applications. Two versions of Renyi&#8217;s entropy are used and compared to the more traditional Shannon formulation. The obtained results are promising and suggest that Renyi&#8217;s entropy may help to reduce the PBIL convergence time, without degrading the quality of the found solutions.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Renyi&#8217;s entropy]]></kwd>
<kwd lng="en"><![CDATA[PBIL]]></kwd>
<kwd lng="en"><![CDATA[wireless network-on-chip (WiNoC)]]></kwd>
<kwd lng="en"><![CDATA[mapping]]></kwd>
<kwd lng="en"><![CDATA[convergence time]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Acharya]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Orlitsky]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Suresh]]></surname>
<given-names><![CDATA[A. T.]]></given-names>
</name>
<name>
<surname><![CDATA[Tyagi]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[The Complexity of Estimating Rényi Entropy]]></source>
<year>2015</year>
<conf-name><![CDATA[ 26th Annual ACM-SIAM Symposium on Discrete Algorithms]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1855-69</page-range></nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Baluja]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[Population-Based Incremental Learning : A Method for Integrating Genetic Search Based Function Optimization and Competitive Learning]]></source>
<year>1994</year>
<publisher-loc><![CDATA[Pittsburgh, Pennsylvania ]]></publisher-loc>
<publisher-name><![CDATA[Carnegie Mellon University]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Blem]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Menon]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Sankaralingam]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Data to accompany a detailed analysis of contemporary arm and x86 architectures]]></source>
<year>2013</year>
</nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Blem]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Menon]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Sankaralingam]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Power struggles: Revisiting the RISC vs. CISC debate]]></source>
<year>2013</year>
<conf-name><![CDATA[ IEEE 19th International Symposium on High Performance Computer Architecture (HPCA2013)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-12</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bolaños]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Aedo]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Rivera]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Static and dynamic task mapping onto network on chip multiprocessors]]></article-title>
<source><![CDATA[Dyna]]></source>
<year>2014</year>
<volume>81</volume>
<numero>185</numero>
<issue>185</issue>
<page-range>28-35</page-range></nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bolanos]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Aedo]]></surname>
<given-names><![CDATA[J. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Rivera]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<source><![CDATA[Comparison of Learning Rules for Adaptive Population-Based Incremental Learning Algorithms]]></source>
<year>2012</year>
<conf-name><![CDATA[ International Conference on Artificial Intelligence, ICAI]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-8</page-range></nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bolanos]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Aedo]]></surname>
<given-names><![CDATA[J. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Rivera]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Bagherzadeh]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Mapping and Scheduling in Heterogeneous NoC through Population-Based Incremental Learning]]></article-title>
<source><![CDATA[Journal of Universal Computer Science]]></source>
<year>2012</year>
<volume>18</volume>
<numero>7</numero>
<issue>7</issue>
<page-range>901-16</page-range></nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[S.-J.]]></given-names>
</name>
<name>
<surname><![CDATA[Lan]]></surname>
<given-names><![CDATA[Y.-C.]]></given-names>
</name>
<name>
<surname><![CDATA[Tsai]]></surname>
<given-names><![CDATA[W.-C.]]></given-names>
</name>
<name>
<surname><![CDATA[Hu]]></surname>
<given-names><![CDATA[Y.-H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Reconfigurable Networks-on-Chip]]></source>
<year>2012</year>
<publisher-loc><![CDATA[US ]]></publisher-loc>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dehghani]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Jamshidi]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A fault-tolerant hierarchical hybrid mesh-based wireless network-on-chip architecture for multicore]]></article-title>
<source><![CDATA[The Journal of Supercomputing]]></source>
<year>2015</year>
<page-range>3116-48</page-range></nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ditomaso]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Kodi]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A-WiNoC: Adaptive wireless network-on-chip architecture for chip multiprocessors]]></article-title>
<source><![CDATA[IEEE Transactions on Parallel and Distributed Systems]]></source>
<year>2015</year>
<volume>26</volume>
<numero>12</numero>
<issue>12</issue>
<page-range>3289-302</page-range></nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fan]]></surname>
<given-names><![CDATA[L. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhuang]]></surname>
<given-names><![CDATA[Z. Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Fu]]></surname>
<given-names><![CDATA[Z. Q.]]></given-names>
</name>
</person-group>
<source><![CDATA[An approach for dynamic hardware /software partitioning based on DPBIL]]></source>
<year>2007</year>
<volume>5</volume>
<numero>Icnc</numero>
<conf-name><![CDATA[ Third International Conference on Natural Computation, ICNC 2007]]></conf-name>
<conf-loc> </conf-loc>
<issue>Icnc</issue>
<page-range>581-5</page-range></nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gosling]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Tsang]]></surname>
<given-names><![CDATA[P. E.]]></given-names>
</name>
</person-group>
<source><![CDATA[Population Based Incremental Learning Versus Genetic Algorithms : Iterated Prisoners Dilemma]]></source>
<year>2004</year>
<publisher-loc><![CDATA[England ]]></publisher-loc>
<publisher-name><![CDATA[University of Essex]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Guerre]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Ventroux]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[David]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Merigot]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Hierarchical network-on-chip for embedded many-core architectures]]></source>
<year>2010</year>
<conf-name><![CDATA[ NOCS 2010 - The 4th ACM/IEEE International Symposium on Networks-on-Chip]]></conf-name>
<conf-loc> </conf-loc>
<page-range>189-96</page-range></nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jelinek]]></surname>
<given-names><![CDATA[H. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Cornforth]]></surname>
<given-names><![CDATA[D. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Tarvainen]]></surname>
<given-names><![CDATA[M. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Miloevic]]></surname>
<given-names><![CDATA[N. T.]]></given-names>
</name>
</person-group>
<source><![CDATA[Multiscale Renyi Entropy and Cardiac Autonomic Neuropathy]]></source>
<year>2015</year>
<conf-name><![CDATA[ 2015 20th International Conference on Control Systems and Computer Science]]></conf-name>
<conf-loc> </conf-loc>
<page-range>545-7</page-range></nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lankes]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Wild]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Herkersdorf]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Hierarchical NoCs for optimized access to shared memory and IO resources]]></source>
<year>2009</year>
<conf-name><![CDATA[ 12th Euromicro Conference on Digital System Design: Architectures, Methods and Tools, DSD 2009]]></conf-name>
<conf-loc> </conf-loc>
<page-range>255-62</page-range></nlm-citation>
</ref>
<ref id="B16">
<label>16</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[X]]></given-names>
</name>
</person-group>
<source><![CDATA[Survey of Wireless Network-on-Chip Systems]]></source>
<year>2012</year>
<publisher-name><![CDATA[Auburn University]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<label>17</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Marsh]]></surname>
<given-names><![CDATA[J. N.]]></given-names>
</name>
<name>
<surname><![CDATA[Wallace]]></surname>
<given-names><![CDATA[K. D.]]></given-names>
</name>
<name>
<surname><![CDATA[McCarthy]]></surname>
<given-names><![CDATA[J. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Wickerhauser]]></surname>
<given-names><![CDATA[M. V.]]></given-names>
</name>
<name>
<surname><![CDATA[Maurizi]]></surname>
<given-names><![CDATA[B. N.]]></given-names>
</name>
<name>
<surname><![CDATA[Lanza]]></surname>
<given-names><![CDATA[G. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Wickline]]></surname>
<given-names><![CDATA[S. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Hughes]]></surname>
<given-names><![CDATA[M. S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Application of a real-time, calculable limiting form of the Renyi entropy for molecular imaging of tumors]]></article-title>
<source><![CDATA[IEEE Transactions on Ultrasonics, Ferroelectrics, and Frequency Control]]></source>
<year>2010</year>
<volume>57</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>1890-5</page-range></nlm-citation>
</ref>
<ref id="B18">
<label>18</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Motahari]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Bresler]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Tse]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Information Theory of DNA Shotgun Sequencing]]></article-title>
<source><![CDATA[IEEE Transaction on Information Theory]]></source>
<year>2013</year>
<volume>59</volume>
<numero>10</numero>
<issue>10</issue>
<page-range>1-33</page-range></nlm-citation>
</ref>
<ref id="B19">
<label>19</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Munir]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Gordon-Ross]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Ranka]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[High-Performance Energy-Efficient Multi-core-Based Parallel Embedded Computing]]></article-title>
<source><![CDATA[Modeling and Optimization of Parallel and Distributed Embedded Systems]]></source>
<year>2016</year>
<page-range>159-90</page-range><publisher-loc><![CDATA[Chichester, UK ]]></publisher-loc>
<publisher-name><![CDATA[John Wiley &amp; Sons, Ltd]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B20">
<label>20</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Palafox]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<source><![CDATA[Gene Regulatory Network Reverse Engineering using Population Based Incremental Learning and K-means]]></source>
<year>2012</year>
<conf-name><![CDATA[ 14th annual conference companion on Genetic and Evolutionary Computation, GECCO&#8217;12]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1423-4</page-range></nlm-citation>
</ref>
<ref id="B21">
<label>21</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pfister]]></surname>
<given-names><![CDATA[C. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Sullivan]]></surname>
<given-names><![CDATA[W. G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Renyi entropy, guesswork moments, and large deviations]]></article-title>
<source><![CDATA[IEEE Transactions on Information Theory]]></source>
<year>2004</year>
<volume>50</volume>
<numero>11</numero>
<issue>11</issue>
<page-range>2794-800</page-range></nlm-citation>
</ref>
<ref id="B22">
<label>22</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ramos-Paja]]></surname>
<given-names><![CDATA[C. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Bolanos]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Gonzalez]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Ramirez]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Camarillo]]></surname>
<given-names><![CDATA[J. R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Reducing the Fuel Consumption of Hybrid Fuel Cell/Photovoltaic Power Systems Using PBIL-Based Reconfiguration]]></source>
<year>2015</year>
<conf-name><![CDATA[ 2015 Asia-Pacific Conference on Computer Aided System Engineering]]></conf-name>
<conf-loc> </conf-loc>
<page-range>90-5</page-range></nlm-citation>
</ref>
<ref id="B23">
<label>23</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rényi]]></surname>
<given-names><![CDATA[a]]></given-names>
</name>
</person-group>
<source><![CDATA[On measures of entropy and information]]></source>
<year>1961</year>
<volume>1</volume>
<numero>c</numero>
<conf-name><![CDATA[ Fourth Berkeley Symposium on Mathematical Statistics and Probability]]></conf-name>
<conf-loc> </conf-loc>
<issue>c</issue>
<page-range>547-61</page-range></nlm-citation>
</ref>
<ref id="B24">
<label>24</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rezaei]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Daneshtalab]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Safaei]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhao]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Hierarchical approach for hybrid wireless network-on-chip in manycore era]]></article-title>
<source><![CDATA[Computers and Electrical Engineering]]></source>
<year>2016</year>
<volume>51</volume>
<page-range>225-34</page-range></nlm-citation>
</ref>
<ref id="B25">
<label>25</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rezaei]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Safaei]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Daneshtalab]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Tenhunen]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[HiWA: A hierarchical wireless network-on-chip architecture]]></source>
<year>2014</year>
<conf-name><![CDATA[ International Conference on High Performance Computing &amp; Simulation, HPCS]]></conf-name>
<conf-loc> </conf-loc>
<page-range>499-505</page-range></nlm-citation>
</ref>
<ref id="B26">
<label>26</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sacanamboy]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Bolaños]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Nieto]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[A Primer for Mapping Techniques on NoC Systems]]></source>
<year>2014</year>
<conf-name><![CDATA[ ESA (2014) Proceedings 12th International Conference on Embedded Systems and Applications]]></conf-name>
<conf-loc> </conf-loc>
<page-range>70-5</page-range></nlm-citation>
</ref>
<ref id="B27">
<label>27</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sacanamboy]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Quesada]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Bolanos]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Bernal]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[O&#8217;Sullivan]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[A comparison between two optimisation alternatives for mapping in wireless network on chip]]></source>
<year>2016</year>
<conf-name><![CDATA[ 2016 IEEE 28th International Conference on Tools with Artificial Intelligence (ICTAI)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>938-45</page-range></nlm-citation>
</ref>
<ref id="B28">
<label>28</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sahu]]></surname>
<given-names><![CDATA[P. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Chattopadhyay]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A survey on application mapping strategies for Network-on-Chip design]]></article-title>
<source><![CDATA[Journal of Systems Architecture]]></source>
<year>2013</year>
<volume>59</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>60-76</page-range></nlm-citation>
</ref>
<ref id="B29">
<label>29</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Thiele]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Bacivarov]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Haid]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Huang]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Mapping applications to tiled multiprocessor embedded systems]]></source>
<year>2007</year>
<conf-name><![CDATA[ 7th International Conference on Application of Concurrency to System Design, ACSD]]></conf-name>
<conf-loc> </conf-loc>
<page-range>29-40</page-range></nlm-citation>
</ref>
<ref id="B30">
<label>30</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tosun]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Ozturk]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Ozkan]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Ozen]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[pplication mapping algorithms for mesh-based network-on-chip architectures]]></article-title>
<source><![CDATA[The Journal of Supercomputing]]></source>
<year>2015</year>
<volume>71</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>995-1017</page-range></nlm-citation>
</ref>
<ref id="B31">
<label>31</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[White]]></surname>
<given-names><![CDATA[R. H]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Competitive hebbian learning: Algorithm and demonstrations]]></article-title>
<source><![CDATA[Neural Networks]]></source>
<year>1992</year>
<volume>5</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>261-75</page-range></nlm-citation>
</ref>
<ref id="B32">
<label>32</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Ma]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Renyi entropy penalized learning algorithm for Gaussian mixture with automated model selection]]></source>
<year>2008</year>
<conf-name><![CDATA[ International Conference on Signal Processing Proceedings, ICSP]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1561-4</page-range></nlm-citation>
</ref>
<ref id="B33">
<label>33</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[Y. Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Jiang]]></surname>
<given-names><![CDATA[G. R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Argument-based negotiation strategy based on adaptive PBIL for resolving conflicts in supply chain collaboration]]></source>
<year>2014</year>
<conf-name><![CDATA[ International Conference on Management Science and Engineering - Annual Conference Proceedings]]></conf-name>
<conf-loc> </conf-loc>
<page-range>315-20</page-range></nlm-citation>
</ref>
<ref id="B34">
<label>34</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Xing]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Qu]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A population based incremental learning for network coding resources minimization]]></article-title>
<source><![CDATA[IEEE Communication Letters]]></source>
<year>2011</year>
<volume>15</volume>
<numero>7</numero>
<issue>7</issue>
<page-range>698-700</page-range></nlm-citation>
</ref>
<ref id="B35">
<label>35</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Xu]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Erdogmuns]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Renyi&#8217;s entropy, divergence and their nonparametric estimators]]></article-title>
<source><![CDATA[Information Theoretic Learning: Renyi&#8217;s Entropy and Kernel Perspectives]]></source>
<year>2010</year>
<page-range>47-102</page-range><publisher-loc><![CDATA[New York, NY ]]></publisher-loc>
<publisher-name><![CDATA[Springer New York]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B36">
<label>36</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Yao]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Experimental Study on Population-Based Incremental Learning Algorithms for Dynamic Optimization Problems]]></article-title>
<source><![CDATA[Soft Computing]]></source>
<year>2005</year>
<volume>9</volume>
<numero>11</numero>
<issue>11</issue>
<page-range>815-34</page-range></nlm-citation>
</ref>
<ref id="B37">
<label>37</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhao]]></surname>
<given-names><![CDATA[G.-h.]]></given-names>
</name>
<name>
<surname><![CDATA[Hao]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Incremental learning algorithm of least squares support vector machines based on Renyi entropy]]></source>
<year>2009</year>
<conf-name><![CDATA[ 2009 International Conference on Management Science and Engineering, ICMSE]]></conf-name>
<conf-loc> </conf-loc>
<page-range>95-100</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
