Sciweavers

1160 search results - page 93 / 232
» Applying Constraint Solving to the Management of Distributed...
Sort
View
EUC
2006
Springer
15 years 8 months ago
DiCa: Distributed Tag Access with Collision-Avoidance Among Mobile RFID Readers
Abstract. Advances in wireless and mobile communication technologies have enabled the development of various RFID-based systems and applications in addition to the extension of the...
Kwang-il Hwang, Kyung Tae Kim, Doo Seop Eom
GECCO
2006
Springer
168views Optimization» more  GECCO 2006»
15 years 8 months ago
3D airspace sectoring by evolutionary computation: real-world applications
This paper presents a new method for 3D cutting of geometrical space with application to airspace sectoring. This problem comes from the air traffic management but the proposed me...
Daniel Delahaye, Stephane Puechmorel
CP
2006
Springer
15 years 6 months ago
Distributed Stable Matching Problems with Ties and Incomplete Lists
We consider the Stable Marriage Problem and the Stable Roommates Problem in presence of ties and incomplete preference lists. They can be solved by centralized algorithms, but this...
Ismel Brito, Pedro Meseguer
ASWEC
2008
IEEE
15 years 10 months ago
A Survey of Policy-Based Management Approaches for Service Oriented Systems
Policy based management in Service Oriented Architecture (SOA) allows organizations to apply rules and regulations on their business processes. Policy has long been employed in th...
Tan Phan, Jun Han, Jean-Guy Schneider, Tim Ebringe...
GECCO
2007
Springer
129views Optimization» more  GECCO 2007»
15 years 10 months ago
Procreating V-detectors for nonself recognition: an application to anomaly detection in power systems
The artificial immune system approach for self-nonself discrimination and its application to anomaly detection problems in engineering is showing great promise. A seminal contribu...
Min Gui, Sanjoy Das, Anil Pahwa