Sciweavers

35419 search results - page 7021 / 7084
» How are we doing
Sort
View
121
Voted
ESAS
2004
Springer
15 years 9 months ago
Secure Overlay for Service Centric Wireless Sensor Networks
Sensor networks consist of a potentially huge number of very small and resource limited self-organizing devices. Those devices offer different services and use services provided b...
Hans-Joachim Hof, Erik-Oliver Blaß, Martina ...
GECCO
2004
Springer
110views Optimization» more  GECCO 2004»
15 years 9 months ago
Is the Predicted ESS in the Sequential Assessment Game Evolvable?
The Sequential Assessment Game model of animal contests predicts an evolutionarily stable strategy (ESS) that is a sequence of thresholds for giving up. Simulated evolution experim...
Winfried Just, Xiaolu Sun
142
Voted
GECCO
2004
Springer
164views Optimization» more  GECCO 2004»
15 years 9 months ago
Fuzzy Dominance Based Multi-objective GA-Simplex Hybrid Algorithms Applied to Gene Network Models
Hybrid algorithms that combine genetic algorithms with the Nelder-Mead simplex algorithm have been effective in solving certain optimization problems. In this article, we apply a s...
Praveen Koduru, Sanjoy Das, Stephen Welch, Judith ...
MATA
2004
Springer
103views Communications» more  MATA 2004»
15 years 8 months ago
Mobility Prediction for Mobile Agent-Based Service Continuity in the Wireless Internet
New challenging deployment scenarios are integrating mobile devices with limited and heterogeneous capabilities that roam among wireless access localities during service provisioni...
Paolo Bellavista, Antonio Corradi, Carlo Giannelli
RAID
2004
Springer
15 years 8 months ago
RheoStat: Real-Time Risk Management
As the frequency of attacks faced by the average host connected to the Internet increases, reliance on manual intervention for response is decreasingly tenable. Operating system an...
Ashish Gehani, Gershon Kedem
« Prev « First page 7021 / 7084 Last » Next »