Sciweavers

351 search results - page 23 / 71
» Evaluation of Different Metaheuristics Solving the RND Probl...
Sort
View
CLOUDCOM
2010
Springer
13 years 5 months ago
Cost-Optimal Outsourcing of Applications into the Clouds
Abstract--Commercial services for provisioning software components and virtual infrastructure in the cloud are emerging. For customers, this creates a multitude of possibilities fo...
Immanuel Trummer, Frank Leymann, Ralph Mietzner, W...
DGCI
2006
Springer
13 years 11 months ago
A Network Flow Algorithm for Binary Image Reconstruction from Few Projections
Tomography deals with the reconstruction of images from their projections. In this paper we focus on tomographic reconstruction of binary images (i.e., black-and-white) that do not...
Kees Joost Batenburg
AISC
2004
Springer
13 years 11 months ago
Four Approaches to Automated Reasoning with Differential Algebraic Structures
While implementing a proof for the Basic Perturbation Lemma (a central result in Homological Algebra) in the theorem prover Isabelle one faces problems such as the implementation o...
Jesús Aransay, Clemens Ballarin, Julio Rubi...
EUSFLAT
2001
100views Fuzzy Logic» more  EUSFLAT 2001»
13 years 9 months ago
Fuzzy modelling using fuzzy mathematical programming
In this paper we will describe several methods that solve, using mathematical programming, different problems that, although can be used in others fields in the fuzzy modelling co...
José Manuel Cadenas, M. Carmen Garrido, J. ...
CIS
2008
Springer
13 years 9 months ago
A Near-Optimal Redundancy Allocation Strategy that Minimizes a System's Vulnerability to Hazardous Events and Malicious Attacks
Delivering continuous services in information infrastructures is a major challenge. For system or network administrators, redundancy allocation is one of the best strategies to en...
Frank Yeong-Sung Lin, Po-Hao Tsang, Kun-Dao Jiang