Sciweavers

970 search results - page 136 / 194
» A comprehensive analysis of hyper-heuristics
Sort
View
HICSS
2008
IEEE
107views Biometrics» more  HICSS 2008»
14 years 2 months ago
Research on Constraints in Anti-Money Laundering (AML) Business Process in China Based on Theory of Constraints
Anti-money laundering is a pressing issue in today’s economy. With the newly launched Chinese anti-money laundering regulation, this issue has drawn more and more attention from...
Xuan Liu, Pengzhu Zhang
ICC
2008
IEEE
159views Communications» more  ICC 2008»
14 years 2 months ago
A Performance Study of Mobile Handoff Delay in IEEE 802.11-Based Wireless Mesh Networks
— Wireless mesh networks (WMNs) have recently emerged to be a cost-effective solution to support large-scale wireless Internet access. One important component of realizing large-...
Akshay Mangalam Srivatsa, Jiang Xie
ICDCS
2008
IEEE
14 years 2 months ago
Hotness-Aware Sensor Networks
In a realistic sensor network, in particular with a nonuniform deployment, sensor nodes inevitably have varying workloads. This causes a natural problem that some sensor nodes are...
Dong Li, Yanmin Zhu, Li Cui, Lionel M. Ni
ICDCSW
2008
IEEE
14 years 2 months ago
Modeling Attack Behaviors in Rating Systems
Abstract— Online feedback-based rating systems are gaining popularity. Dealing with unfair ratings in such systems has been recognized as an important problem and many unfair rat...
Qinyuan Feng, Yafei Yang, Yan Lindsay Sun, Yafei D...
INFOCOM
2008
IEEE
14 years 2 months ago
Probabilistic Approach to Provisioning Guaranteed QoS for Distributed Event Detection
—It has been of significant importance to provision network-wide guaranteed QoS for a wide range of event detection applications in wireless sensor networks (WSNs). This paper in...
Yanmin Zhu, Lionel M. Ni