Sciweavers

1092 search results - page 213 / 219
» Located Operators
Sort
View
CORR
2010
Springer
125views Education» more  CORR 2010»
13 years 10 months ago
Critical control of a genetic algorithm
Based on speculations coming from statistical mechanics and the conjectured existence of critical states, I propose a simple heuristic in order to control the mutation probability...
Raphaël Cerf
ENVSOFT
2008
78views more  ENVSOFT 2008»
13 years 10 months ago
A general water supply planning model: Evaluation of decentralized treatment
Increasing population, diminishing supplies and variable climatic conditions can cause difficulties in meeting water demands; especially in arid regions where water resources are ...
G. Chung, K. Lansey, P. Blowers, P. Brooks, W. Ela...
ENVSOFT
2006
102views more  ENVSOFT 2006»
13 years 9 months ago
Gas exploration beyond the shelf break: An oceanographic challenge
Norway's second largest gas field, Ormen Lange, is located 140 km west off Kristiansund at an unprecedented depth when it comes to exploration. It will be the first Norwegian...
Ø. Thiem, J. Berntsen, T. Eldevik, G. Alend...
ISF
2008
114views more  ISF 2008»
13 years 9 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
JNW
2008
77views more  JNW 2008»
13 years 9 months ago
Datacasting In The Mobile Environment
Datacasting employs the excess bandwidth from digital television signals for use in one-way data transmission, and it is being used successfully for high-speed downloads at fixed l...
Kent Chamberlin, Benjamin McMahon, Scott Valcourt