Sciweavers

68 search results - page 13 / 14
» A Survey of Constraint Handling Techniques in Evolutionary C...
Sort
View
CORR
2010
Springer
87views Education» more  CORR 2010»
13 years 5 months ago
Using Evolution Strategy with Meta-models for Well Placement Optimization
Optimum implementation of non-conventional wells allows us to increase considerably hydrocarbon recovery. By considering the high drilling cost and the potential improvement in we...
Zyed Bouzarkouna, Didier Yu Ding, Anne Auger
VRML
2010
ACM
13 years 6 months ago
Remote scientific visualization of progressive 3D meshes with X3D
This paper presents a framework, integrated into the X3D file format, for the streaming of 3D content in the context of remote scientific visualization; a progressive mesh compres...
Adrien Maglo, Ho Lee, Guillaume Lavoué, Chr...
MSWIM
2006
ACM
14 years 16 days ago
Testing methodology for an ad hoc routing protocol
In this paper, we define a model of an ad hoc routing protocol, i.e. the OLSR (Optimized Link-State Routing) protocol. This model handles novel constraints related to such networ...
Stéphane Maag, Fatiha Zaïdi
TDSC
2011
13 years 1 months ago
CASTLE: Continuously Anonymizing Data Streams
— Most of existing privacy preserving techniques, such as k-anonymity methods, are designed for static data sets. As such, they cannot be applied to streaming data which are cont...
Jianneng Cao, Barbara Carminati, Elena Ferrari, Ki...
COMPSAC
2002
IEEE
13 years 11 months ago
A Graphically Based Language for Constructing, Executing and Analysing Models of Software Systems
With computer systems becoming ever larger and more complex, the cost and effort associated with their construction is increasing and the systems are now sufficiently complex that...
Robert John Walters