Sciweavers

1345 search results - page 234 / 269
» Optimal Control With Noisy Time
Sort
View
144
Voted
CCS
2007
ACM
15 years 10 months ago
Provably secure ciphertext policy ABE
In ciphertext policy attribute-based encryption (CP-ABE), every secret key is associated with a set of attributes, and every ciphertext is associated with an access structure on a...
Ling Cheung, Calvin C. Newport
GECCO
2007
Springer
150views Optimization» more  GECCO 2007»
15 years 10 months ago
Credit assignment in adaptive memetic algorithms
Adaptive Memetic Algorithms couple an evolutionary algorithm with a number of local search heuristics for improving the evolving solutions. They are part of a broad family of meta...
J. E. Smith
118
Voted
GECCO
2007
Springer
200views Optimization» more  GECCO 2007»
15 years 10 months ago
Performance analysis of niching algorithms based on derandomized-ES variants
A survey of niching algorithms, based on 5 variants of derandomized Evolution Strategies (ES), is introduced. This set of niching algorithms, ranging from the very first derandom...
Ofer M. Shir, Thomas Bäck
126
Voted
GECCO
2007
Springer
164views Optimization» more  GECCO 2007»
15 years 10 months ago
Is the island model fault tolerant?
In this paper, we present a study on the fault tolerance nature of the island model when applied to Genetic Algorithms. Parallel and distributed models have been extensively appli...
José Ignacio Hidalgo, Juan Lanchares, Franc...
125
Voted
GECCO
2007
Springer
158views Optimization» more  GECCO 2007»
15 years 10 months ago
A leader-based parallel cross entropy algorithm for MCP
The Cross Entropy algorithm is a new search method for combinatorial problem. However, it needs considerable computational time to achieve good solution quality. To make the Cross...
Zhanhua Bai, Qiang Lv