Sciweavers

357 search results - page 46 / 72
» Ontologies for Modeling and Simulation: Issues and Approache...
Sort
View
GECCO
2005
Springer
120views Optimization» more  GECCO 2005»
14 years 1 months ago
Using predators and preys in evolution strategies
This poster presents an evolution strategy for single- and multi-objective optimization. The model uses the predatorprey approach from ecology to scale between both cases. Further...
Karlheinz Schmitt, Jörn Mehnen, Thomas Michel...
GISCIENCE
2004
Springer
110views GIS» more  GISCIENCE 2004»
14 years 1 months ago
Information Dissemination in Mobile Ad-Hoc Geosensor Networks
This paper addresses the issue of how to disseminate relevant information to mobile agents within a geosensor network. Conventional mobile and location-aware systems are founded on...
Silvia Nittel, Matt Duckham, Lars Kulik
INFOCOM
2007
IEEE
14 years 2 months ago
VoIP on Wireless Meshes: Models, Algorithms and Evaluation
—We study the problem of supporting VoIP calls in a wireless mesh network. Specifically, we propose solutions for call admission control (CAC) and route selection for VoIP calls...
Anand Kashyap, Samrat Ganguly, Samir R. Das, Suman...
RTSS
1999
IEEE
14 years 13 hour ago
High-Level Modeling and Analysis of TCAS
In this paper, we demonstrate a high-level approach to modeling and analyzing complex safety-critical systems through a case study in the area of air traffic management. In partic...
Carolos Livadas, John Lygeros, Nancy A. Lynch
ICNP
2007
IEEE
14 years 2 months ago
Location Privacy in Sensor Networks Against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
K. Mehta, Donggang Liu, Matthew Wright