Sciweavers

4330 search results - page 748 / 866
» Analyzing security architectures
Sort
View
GECCO
2007
Springer
158views Optimization» more  GECCO 2007»
15 years 10 months ago
A leader-based parallel cross entropy algorithm for MCP
The Cross Entropy algorithm is a new search method for combinatorial problem. However, it needs considerable computational time to achieve good solution quality. To make the Cross...
Zhanhua Bai, Qiang Lv
MABS
2007
Springer
15 years 10 months ago
System Issues in Multi-agent Simulation of Large Crowds
Crowd simulation is a complex and challenging domain. Crowds demonstrate many complex behaviours and are consequently difficult to model for realistic simulation systems. Analyzing...
Vidit Bansal, Ramachandra Kota, Kamalakar Karlapal...
AICT
2006
IEEE
128views Communications» more  AICT 2006»
15 years 9 months ago
Development of SOA-Based Software Systems - an Evolutionary Programming Approach
A software application has strong relationships with the business processes it supports. In the analysis phase those parts of the processes in which the software system is applied...
Christian Emig, Jochen Weisser, Sebastian Abeck
CNSR
2006
IEEE
111views Communications» more  CNSR 2006»
15 years 9 months ago
Transparent Ring-to-Ring Interconnection for Metro Core Optical Network
The deployment of Reconfigurable Optical Add/Drop Multiplexers (ROADMs) is going to change the conventional architecture for metro networks. In this paper, we present detailed fea...
Choudhury A. Al Sayeed, Alex Vukovic, Oliver W. W....
DEEC
2006
IEEE
15 years 9 months ago
BestChoice: A Decision Support System for Supplier Selection in e-Marketplaces
A growing number of companies are outsourcing their purchasing processes to independent purchasing agencies. These agencies now have to process an ever increasing number of purchas...
Dongjoo Lee, Taehee Lee, Suekyung Lee, Ok-Ran Jeon...