Sciweavers

1663 search results - page 173 / 333
» Computer Security in the Real World
Sort
View
GECCO
2005
Springer
145views Optimization» more  GECCO 2005»
15 years 9 months ago
Three dimensional evolutionary aerodynamic design optimization with CMA-ES
In this paper, we present the application of evolutionary optimization methods to a demanding, industrially relevant engineering domain, the three-dimensional optimization of gas ...
Martina Hasenjäger, Bernhard Sendhoff, Toyota...
GECCO
2005
Springer
175views Optimization» more  GECCO 2005»
15 years 9 months ago
Nonlinear feature extraction using a neuro genetic hybrid
Feature extraction is a process that extracts salient features from observed variables. It is considered a promising alternative to overcome the problems of weight and structure o...
Yung-Keun Kwon, Byung Ro Moon
ICCS
2005
Springer
15 years 9 months ago
Language Technologies Meet Ontology Acquisition
This paper overviews and analyses the on-going research attempts to apply language technologies to automatic ontology acquisition. At first glance there are many successful approac...
Galia Angelova
MIDDLEWARE
2005
Springer
15 years 9 months ago
Combining Flexibility and Scalability in a Peer-to-Peer Publish/Subscribe System
The content-based publish/subscribe model has been adopted by many services to deliver data between distributed users based on application-specific semantics. Two key issues in su...
Chi Zhang, Arvind Krishnamurthy, Randolph Y. Wang,...
OTM
2005
Springer
15 years 9 months ago
Event Broker Grids with Filtering, Aggregation, and Correlation for Wireless Sensor Data
Abstract. A significant increase in real world event monitoring capability with wireless sensor networks brought a new challenge to ubiquitous computing. To manage high volume and...
Eiko Yoneki