Sciweavers

1692 search results - page 302 / 339
» A Dynamic Network Interdiction Problem
Sort
View
GECCO
2010
Springer
187views Optimization» more  GECCO 2010»
13 years 11 months ago
Evolving agent behavior in multiobjective domains using fitness-based shaping
Multiobjective evolutionary algorithms have long been applied to engineering problems. Lately they have also been used to evolve behaviors for intelligent agents. In such applicat...
Jacob Schrum, Risto Miikkulainen
ASPDAC
2008
ACM
104views Hardware» more  ASPDAC 2008»
13 years 10 months ago
Low power clock buffer planning methodology in F-D placement for large scale circuit design
Traditionally, clock network layout is performed after cell placement. Such methodology is facing a serious problem in nanometer IC designs where people tend to use huge clock buff...
Yanfeng Wang, Qiang Zhou, Yici Cai, Jiang Hu, Xian...
ICISC
2004
127views Cryptology» more  ICISC 2004»
13 years 10 months ago
Identity-Based Access Control for Ad Hoc Groups
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
PDPTA
2003
13 years 10 months ago
Load Balancing Voice Applications with Piranha
In this paper, we investigate the load balancing problem among a cluster of mobile and fixed devices in a voice enabled interface. We consider a design approach. The voice interfa...
Mustapha Hadim, Pierre Manneback, Michel Bagein, P...
CPHYSICS
2010
88views more  CPHYSICS 2010»
13 years 8 months ago
Distributed computing as a virtual supercomputer: Tools to run and manage large-scale BOINC simulations
Distributed computing (DC) projects tackle large computational problems by exploiting the donated processing power of thousands of volunteered computers, connected through the Int...
Toni Giorgino, Matt J. Harvey, Gianni De Fabritiis