Sciweavers

3629 search results - page 703 / 726
» A Network Memory Architecture Model and Performance Analysis
Sort
View
GECCO
2007
Springer
181views Optimization» more  GECCO 2007»
14 years 1 months ago
Exploring selection mechanisms for an agent-based distributed evolutionary algorithm
In this paper we propose an agent-based model of evolutionary algorithms (EAs) which extends seamlessly from concurrent single-host to distributed multi-host installations. Since ...
A. E. Eiben, Marc Schoenauer, Juan Luís Jim...
LICS
1999
IEEE
13 years 12 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson
MTA
2007
183views more  MTA 2007»
13 years 7 months ago
The design of a wireless real-time visual surveillance system
In this paper, we study the important issues in the design of an efficient WIreless real-time visual SurveillancE System (WISES). Two important considerations are to minimize: (1)...
Kam-yiu Lam, Calvin K. H. Chiu
NN
2004
Springer
102views Neural Networks» more  NN 2004»
14 years 1 months ago
A Quantitative Evaluation of a Bio-inspired Sound Segregation Technique for Two- and Three-Source Mixtures
A sound source separation technique based on a bio-inspired neural network, capable of functioning in more than two-source mixtures, is proposed. Separation results are compared wi...
Ramin Pichevar, Jean Rouat
ATAL
2008
Springer
13 years 9 months ago
Pan-supplier stock control in a virtual warehouse
We describe the commercial application of agents to the handling of catalogue and stock-control for the selling of books on the internet. The primary characteristic of the target ...
Emad El-Deen El-Akehal, Julian A. Padget