Sciweavers

6518 search results - page 1274 / 1304
» Distributed Individual-Based Simulation
Sort
View
GECCO
2008
Springer
152views Optimization» more  GECCO 2008»
13 years 10 months ago
Combatting financial fraud: a coevolutionary anomaly detection approach
A major difficulty for anomaly detection lies in discovering boundaries between normal and anomalous behavior, due to the deficiency of abnormal samples in the training phase. In...
Shelly Xiaonan Wu, Wolfgang Banzhaf
GECCO
2008
Springer
186views Optimization» more  GECCO 2008»
13 years 10 months ago
A pareto following variation operator for fast-converging multiobjective evolutionary algorithms
One of the major difficulties when applying Multiobjective Evolutionary Algorithms (MOEA) to real world problems is the large number of objective function evaluations. Approximate...
A. K. M. Khaled Ahsan Talukder, Michael Kirley, Ra...
DAC
2010
ACM
13 years 9 months ago
A correlation-based design space exploration methodology for multi-processor systems-on-chip
Given the increasing complexity of multi-processor systems-onchip, a wide range of parameters must be tuned to find the best trade-offs in terms of the selected system figures of ...
Giovanni Mariani, Aleksandar Brankovic, Gianluca P...
ATAL
2010
Springer
13 years 9 months ago
A probabilistic model for trust and reputation
This paper concerns the problem of agent trust in an electronic market place. We maintain that agent trust involves making decisions under uncertainty and therefore the phenomenon...
George Vogiatzis, Ian MacGillivray, Maria Chli
MOBICOM
2010
ACM
13 years 9 months ago
Inferring and mitigating a link's hindering transmissions in managed 802.11 wireless networks
In 802.11 managed wireless networks, the manager can address under-served links by rate-limiting the conflicting nodes. In order to determine to what extent each conflicting node ...
Eugenio Magistretti, Omer Gurewitz, Edward W. Knig...
« Prev « First page 1274 / 1304 Last » Next »