Sciweavers

4307 search results - page 725 / 862
» Dynamic Spyware Analysis
Sort
View
GECCO
2005
Springer
228views Optimization» more  GECCO 2005»
14 years 2 months ago
Applying metaheuristic techniques to search the space of bidding strategies in combinatorial auctions
Many non-cooperative settings that could potentially be studied using game theory are characterized by having very large strategy spaces and payoffs that are costly to compute. Be...
Ashish Sureka, Peter R. Wurman
ICCNMC
2005
Springer
14 years 2 months ago
Modeling and Performance Evaluation of Handover Service in Wireless Networks
With the development of wireless network, more and more applications require the QoS for message transmission. In order to enhance the QoS service in the dynamic changing wireless ...
Wenfeng Du, Lidong Lin, Weijia Jia, Guojun Wang
ICCNMC
2005
Springer
14 years 2 months ago
Curve-Based Greedy Routing Algorithm for Sensor Networks
Routing packets along a specified curve is a new approach to forwarding packets in large-scale dense sensor networks. Forwarding packets along trajectories can be very effective in...
Jin Zhang, Yaping Lin, Mu Lin, Ping Li, Si-wang Zh...
ICCS
2005
Springer
14 years 2 months ago
Ensemble-Based Data Assimilation for Atmospheric Chemical Transport Models
The task of providing an optimal analysis of the state of the atmosphere requires the development of dynamic data-driven systems (d3 as) that efficiently integrate the observationa...
Adrian Sandu, Emil M. Constantinescu, Wenyuan Liao...
ICIAR
2005
Springer
14 years 2 months ago
Shape Similarity Measurement for Boundary Based Features
In this study, we propose two algorithms for measuring the distance between shape boundaries. In the algorithms, shape boundary is represented by the Beam Angle Statistics (BAS), w...
Nafiz Arica, Fatos T. Yarman-Vural