Sciweavers

1833 search results - page 40 / 367
» Mechanized Verification with Sharing
Sort
View
GECCO
2008
Springer
118views Optimization» more  GECCO 2008»
14 years 1 days ago
Theoretical analysis of diversity mechanisms for global exploration
Maintaining diversity is important for the performance of evolutionary algorithms. Diversity mechanisms can enhance global exploration of the search space and enable crossover to ...
Tobias Friedrich, Pietro Simone Oliveto, Dirk Sudh...
WWW
2008
ACM
14 years 11 months ago
An efficient two-phase service discovery mechanism
This paper brings forward a two-phase semantic service discovery mechanism which supports both the operation matchmaking and operation-composition matchmaking. A serial of experim...
ShuiGuang Deng, Zhaohui Wu, Jian Wu, Ying Li
IEEEARES
2008
IEEE
14 years 5 months ago
haplog: A Hash-Only and Privacy-Preserved Secure Logging Mechanism
A secure logging mechanism named haplog is proposed. In essence, haplog uses only one-way hash functions to achieve the security and functional requirements of logging. This makes...
Chih-Yin Lin
WIOPT
2006
IEEE
14 years 5 months ago
Resource control for the EDCA and HCCA mechanisms in IEEE 802.11e networks
— We investigate the problem of efficient resource control for elastic traffic over the EDCA (Enhanced Distributed Channel Access) and HCCA (Hybrid Coordination Function HCF - ...
Vasilios A. Siris, Costas Courcoubetis
INFOCOM
2002
IEEE
14 years 3 months ago
Coexistence Mechanisms for Interference Mitigation between IEEE 802.11 WLANs and Bluetooth
Abstract— Different wireless systems sharing the same frequency band and operating in the same environment are likely to interfere with each other and experience a severe decreas...
Carla-Fabiana Chiasserini, Ramesh R. Rao