Sciweavers

780 search results - page 85 / 156
» A New Identification Scheme Based on the Perceptrons Problem
Sort
View
GECCO
2005
Springer
157views Optimization» more  GECCO 2005»
14 years 1 months ago
Simple addition of ranking method for constrained optimization in evolutionary algorithms
During the optimization of a constrained problem using evolutionary algorithms (EAs), an individual in the population can be described using three important properties, i.e., obje...
Pei Yee Ho, Kazuyuki Shimizu
HIPC
2003
Springer
14 years 27 days ago
Delay and Jitter Minimization in High Performance Internet Computing
Delay and jitter management in high performance active computation is a challenging problem in the emerging area of internet computing. The problem takes a complex new form from it...
Javed I. Khan, Seung Su Yang
IVC
2008
147views more  IVC 2008»
13 years 7 months ago
Distinctive and compact features
We consider the problem of extracting features for multi-class recognition problems. The features are required to make fine distinction between similar classes, combined with tole...
Ayelet Akselrod-Ballin, Shimon Ullman
FC
2001
Springer
123views Cryptology» more  FC 2001»
14 years 5 days ago
Optimistic Fair Exchange with Transparent Signature Recovery
In this paper, we propose a new practical fair exchange protocol allowing the exchange of an electronic item against a signature. The protocol is based on the Guillou-Quisquater s...
Olivier Markowitch, Shahrokh Saeednia
AMC
2010
86views more  AMC 2010»
13 years 7 months ago
BVMs for computing Sturm-Liouville symmetric potentials
The paper deals with the numerical solution of inverse Sturm-Liouville problems with unknown potential symmetric over the interval [0, ]. The proposed method is based on the use o...
Paolo Ghelardoni, Cecilia Magherini