Sciweavers

2006 search results - page 339 / 402
» Heuristic Security-Testing Methods
Sort
View
GECCO
2008
Springer
137views Optimization» more  GECCO 2008»
13 years 10 months ago
Evolutionary path planner for UAVs in realistic environments
This paper presents a path planner for Unmanned Air Vehicles (UAVs) based on Evolutionary Algorithms (EA) that can be used in realistic risky scenarios. The path returned by the a...
Jesús Manuel de la Cruz, Eva Besada-Portas,...
ESA
2010
Springer
162views Algorithms» more  ESA 2010»
13 years 9 months ago
Solving an Avionics Real-Time Scheduling Problem by Advanced IP-Methods
We report on the solution of a real-time scheduling problem that arises in the design of software-based operation control of aircraft. A set of tasks has to be distributed on a min...
Friedrich Eisenbrand, Karthikeyan Kesavan, Raju S....
ADHOC
2008
183views more  ADHOC 2008»
13 years 9 months ago
On ant routing algorithms in ad hoc networks with critical connectivity
This paper shows a novel self-organizing approach for routing datagrams in ad hoc networks, called Distributed Ant Routing (DAR). This approach belongs to the class of routing alg...
Laura Rosati, Matteo Berioli, Gianluca Reali
ANOR
2010
110views more  ANOR 2010»
13 years 9 months ago
Re-solving stochastic programming models for airline revenue management
We study some mathematical programming formulations for the origin-destination model in airline revenue management. In particular, we focus on the traditional probabilistic model ...
Lijian Chen, Tito Homem-de-Mello
AUTOMATICA
2008
139views more  AUTOMATICA 2008»
13 years 9 months ago
Structured low-rank approximation and its applications
Fitting data by a bounded complexity linear model is equivalent to low-rank approximation of a matrix constructed from the data. The data matrix being Hankel structured is equival...
Ivan Markovsky