Sciweavers

1805 search results - page 245 / 361
» A Theory of Closure Operators
Sort
View
INFORMS
2008
55views more  INFORMS 2008»
15 years 4 months ago
Mathematical Programming Algorithms for Two-Path Routing Problems with Reliability Considerations
Most traditional routing problems assume perfect operability of all arcs and nodes. However, when independent arc failure probabilities exist, a secondary objective must be presen...
April K. Andreas, J. Cole Smith
JNS
2008
76views more  JNS 2008»
15 years 4 months ago
Discrete Nonholonomic Lagrangian Systems on Lie Groupoids
This paper studies the construction of geometric integrators for nonholonomic systems. We derive the nonholonomic discrete Euler-Lagrange equations in a setting which permits to de...
David Iglesias, Juan C. Marrero, David Martí...
JSAC
2006
128views more  JSAC 2006»
15 years 4 months ago
A framework for misuse detection in ad hoc networks- part II
We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically stop functioning due to operational failu...
D. Subhadrabandhu, S. Sarkar, F. Anjum
JUCS
2006
101views more  JUCS 2006»
15 years 4 months ago
DS/CDMA Multiuser Detection with Evolutionary Algorithms
This work analyses two heuristic algorithms based on the genetic evolution theory applied to direct sequence code division multiple access (DS/CDMA) communication systems. For diff...
Fernando Ciriaco, Taufik Abrão, Paul Jean E...
SIAMCOMP
2000
97views more  SIAMCOMP 2000»
15 years 4 months ago
Complexity of Some Problems Concerning Varieties and Quasi-Varieties of Algebras
In this paper we consider the complexity of several problems involving finite algebraic structures. Given finite algebras A and B, these problems ask the following. (1) Do A and B ...
Clifford Bergman, Giora Slutzki