Sciweavers

784 search results - page 123 / 157
» An underlying model for defeat mechanisms
Sort
View
GECCO
2008
Springer
137views Optimization» more  GECCO 2008»
13 years 9 months ago
Rank based variation operators for genetic algorithms
We show how and why using genetic operators that are applied with probabilities that depend on the fitness rank of a genotype or phenotype offers a robust alternative to the Sim...
Jorge Cervantes, Christopher R. Stephens
CAISE
2010
Springer
13 years 8 months ago
Dynamic Authorisation Policies for Event-Based Task Delegation
Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are tw...
Khaled Gaaloul, Ehtesham Zahoor, François C...
ICDCSW
2007
IEEE
13 years 8 months ago
A Middleware Support for Agent-Based Application Mobility in Pervasive Environments
—Application mobility is an efficient way to mask uneven conditioning and reduce users’ distractions in pervasive environments. However, since mobility brings more dynamism and...
Yu Zhou, Jiannong Cao, Vaskar Raychoudhury, Joanna...
CORR
2008
Springer
89views Education» more  CORR 2008»
13 years 8 months ago
Idiotypic Immune Networks in Mobile Robot Control
Jerne's idiotypic-network theory postulates that the immune response involves interantibody stimulation and suppression, as well as matching to antigens. The theory has proved...
Amanda M. Whitbrook, Uwe Aickelin, Jonathan M. Gar...
DA
2010
82views more  DA 2010»
13 years 8 months ago
Procurement Auctions for Differentiated Goods
: We consider two mechanisms to procure differentiated goods: the request for quote and an English auction with bidding credits. In the request for quote, each seller submits a pri...
Jason Shachat, J. Todd Swarthout