Sciweavers

2560 search results - page 17 / 512
» Contributions to zero-sum problems
Sort
View
ISI
2005
Springer
14 years 1 months ago
An Ontological Approach to the Document Access Problem of Insider Threat
Verification of legitimate access of documents, which is one aspect of the umbrella of problems in the Insider Threat category, is a challenging problem. This paper describes the r...
Boanerges Aleman-Meza, Phillip Burns, Matthew Eave...
PPSN
1998
Springer
14 years 4 days ago
The Traveling Salesrep Problem, Edge Assembly Crossover, and 2-opt
Optimal results for the Traveling Salesrep Problem have been reported on problems with up to 3038 cities using a GA with Edge Assembly Crossover EAX. This paper rst attempts to ind...
Jean-Paul Watson, Charlie Ross, V. Eisele, J. Dent...
AIPS
2006
13 years 9 months ago
On the Use of UML.P for Modeling a Real Application as a Planning Problem
There is a great interest in the planning community to apply all developments already achieved in the area to real applications. Such scenario makes the community focus on Knowled...
Tiago Stegun Vaquero, Flavio Tonidandel, Leliane N...
TSMC
2008
81views more  TSMC 2008»
13 years 7 months ago
Role Transfer Problems and Algorithms
Role transfer is a usual activity in an organization, especially in a crisis situation. Role assignment and transfer regulations are important to accomplish it. This paper discusse...
Haibin Zhu, MengChu Zhou
CEC
2009
IEEE
13 years 5 months ago
Multi-objective Combinatorial Optimisation with Coincidence algorithm
-- Most optimization algorithms that use probabilistic models focus on extracting the information from good solutions found in the population. A selection method discards the below...
Warin Wattanapornprom, Panuwat Olanviwitchai, Para...