Sciweavers

1918 search results - page 374 / 384
» Discovering Cortical Algorithms
Sort
View
BPSC
2009
240views Business» more  BPSC 2009»
13 years 8 months ago
Modelling and Solving Configuration Problems on Business Processes Using a Multi-Level Constraint Satisfaction Approach
Abstract: In this paper we present our ideas to apply constraint satisfaction on business processes. We propose a multi-level constraint satisfaction approach to handle t levels of...
Wolfgang Runte
CEC
2010
IEEE
13 years 8 months ago
Evolutionary layered hypernetworks for identifying microRNA-mRNA regulatory modules
Abstract-- Exploring microRNA (miRNA) and mRNA regulatory interactions may give new insights into diverse biological phenomena. While elucidating complex miRNA-mRNA interactions ha...
Soo-Jin Kim, JungWoo Ha, Bado Lee, Byoung-Tak Zhan...
CONEXT
2009
ACM
13 years 8 months ago
The age of impatience: optimal replication schemes for opportunistic networks
: We study mobile P2P content dissemination schemes which leverage the local dedicated caches provided by hand-held devices (e.g., smart-phones, PDAs) and opportunistic contacts be...
Joshua Reich, Augustin Chaintreau
GECCO
2008
Springer
121views Optimization» more  GECCO 2008»
13 years 8 months ago
Fast rule representation for continuous attributes in genetics-based machine learning
Genetic-Based Machine Learning Systems (GBML) are comparable in accuracy with other learning methods. However, efficiency is a significant drawback. This paper presents a new rep...
Jaume Bacardit, Natalio Krasnogor
MOBICOM
2010
ACM
13 years 7 months ago
ZiFi: wireless LAN discovery via ZigBee interference signatures
WiFi networks have enjoyed an unprecedent penetration rate in recent years. However, due to the limited coverage, existing WiFi infrastructure only provides intermittent connectiv...
Ruogu Zhou, Yongping Xiong, Guoliang Xing, Limin S...