Sciweavers

1354 search results - page 197 / 271
» Quantum Service Selection
Sort
View
GECCO
2008
Springer
141views Optimization» more  GECCO 2008»
13 years 9 months ago
Co-optimization algorithms
While coevolution has many parallels to natural evolution, methods other than those based on evolutionary principles may be used in the interactive fitness setting. In this paper...
Travis C. Service, Daniel R. Tauritz
ICEBE
2007
IEEE
123views Business» more  ICEBE 2007»
13 years 9 months ago
Practical Access Control Management for Outsourced EPC-related Data in RFID-enabled Supply Chain
To reduce deployment and maintenance costs companies often decide to outsource parts of RFID infrastructure to an external application service provider. In scenarios where outsour...
Sergei Evdokimov, Oliver Günther
ISCI
2008
139views more  ISCI 2008»
13 years 8 months ago
Easishop: Ambient intelligence assists everyday shopping
E-commerce has been one of the success stories of the last decade. Developments in wireless communications and mobile computing have heralded an era of mobile commerce (m-commerce...
Stephen Keegan, Gregory M. P. O'Hare, Michael J. O...
JSS
2007
79views more  JSS 2007»
13 years 8 months ago
Security problems with improper implementations of improved FEA-M
This paper reports security problems with improper implementations of an improved version of FEA-M (fast encryption algorithm for multimedia). It is found that an implementation-d...
Shujun Li, Kwok-Tung Lo
COMCOM
2004
92views more  COMCOM 2004»
13 years 8 months ago
Benefits of traffic engineering using QoS routing schemes and network controls
We demonstrate the benefits of traffic engineering by studying three realistic network models derived from an actual service provider network. We evaluate traffic engineering in t...
Shekhar Srivastava, Balaji Krithikaivasan, Cory C....