Sciweavers

4330 search results - page 756 / 866
» Analyzing security architectures
Sort
View
120
Voted
GCC
2005
Springer
15 years 9 months ago
A Conceptual Modeling Approach to Virtual Organizations in the Grid
One of the key problems with virtual organizations in the context of the (Semantic) Grid is we don’t know how to describe the components used in virtual organizations because the...
William Song, Xiaoming Li
109
Voted
GECCO
2005
Springer
130views Optimization» more  GECCO 2005»
15 years 9 months ago
ATNoSFERES revisited
ATNoSFERES is a Pittsburgh style Learning Classifier System (LCS) in which the rules are represented as edges of an Augmented Transition Network. Genotypes are strings of tokens ...
Samuel Landau, Olivier Sigaud, Marc Schoenauer
136
Voted
GECCO
2005
Springer
160views Optimization» more  GECCO 2005»
15 years 9 months ago
Designing resilient networks using a hybrid genetic algorithm approach
As high-speed networks have proliferated across the globe, their topologies have become sparser due to the increased capacity of communication media and cost considerations. Relia...
Abdullah Konak, Alice E. Smith
134
Voted
ICESS
2005
Springer
15 years 9 months ago
AMT6: End-to-End Active Measurement Tool for IPv6 Network
Since IPv6 has more benefits over IPv4, the development and deployment of the IPv6 protocol-based products are currently taking place and the migration of IPv4 to IPv6 has also be...
Jahwan Koo, Seong-Jin Ahn
119
Voted
ICN
2005
Springer
15 years 9 months ago
Fault Free Shortest Path Routing on the de Bruijn Networks
It is shown that the de Bruijn graph (dBG) can be used as an architecture for interconnection networks and a suitable structure for parallel computation. Recent works have classi...
Ngoc Chi Nguyen, Vo Dinh Minh Nhat, Sungyoung Lee