Sciweavers

2006 search results - page 340 / 402
» Heuristic Security-Testing Methods
Sort
View
COR
2010
155views more  COR 2010»
13 years 9 months ago
A memetic algorithm for the multi-compartment vehicle routing problem with stochastic demands
The Multi-Compartment Vehicle Routing Problem (MC-VRP) consists of designing transportation routes to satisfy the demands of a set of costumers for several products that because o...
Jorge E. Mendoza, Bruno Castanier, Christelle Gu&e...
COR
2010
150views more  COR 2010»
13 years 9 months ago
Black box scatter search for general classes of binary optimization problems
The purpose of this paper is to apply the scatter search methodology to general classes of binary problems. We focus on optimization problems for which the solutions are represent...
Francisco Gortázar, Abraham Duarte, Manuel ...
CN
2008
280views more  CN 2008»
13 years 9 months ago
Joint transmit power and physical carrier sensing adaptation based on loss differentiation for high density IEEE 802.11 WLAN
In high density (HD) IEEE 802.11 WLAN, packet loss can occur due to co-channel interference (asynchronous interference) or collisions (synchronous interference). In order to effec...
Hui Ma, Jing Zhu, Sumit Roy, Soo Young Shin
CORR
2010
Springer
138views Education» more  CORR 2010»
13 years 9 months ago
Data Stream Clustering: Challenges and Issues
Very large databases are required to store massive amounts of data that are continuously inserted and queried. Analyzing huge data sets and extracting valuable pattern in many appl...
Madjid Khalilian, Norwati Mustapha
EOR
2008
87views more  EOR 2008»
13 years 9 months ago
Robust surgery loading
We consider the robust surgery loading problem for a hospital's operating theatre department, which concerns assigning surgeries and sufficient planned slack to operating roo...
Erwin W. Hans, Gerhard Wullink, Mark van Houdenhov...