Sciweavers

811 search results - page 90 / 163
» Refactoring Using Type Constraints
Sort
View
GECCO
2009
Springer
109views Optimization» more  GECCO 2009»
14 years 3 months ago
Crossover operators for multiobjective k-subset selection
Genetic algorithms are often applied to combinatorial optimization problems, the most popular one probably being the traveling salesperson problem. In contrast to permutations use...
Thorsten Meinl, Michael R. Berthold
IDA
2005
Springer
14 years 2 months ago
Probabilistic Latent Clustering of Device Usage
Abstract. We investigate an application of Probabilistic Latent Semantics to the problem of device usage analysis in an infrastructure in which multiple users have access to a shar...
Jean-Marc Andreoli, Guillaume Bouchard
IMR
2004
Springer
14 years 2 months ago
PDE-Based Gradient Limiting for Mesh Size Functions
We propose a new method for limiting the gradients in a mesh size function by solving a non-linear partial differential equation on the background mesh. Our gradient limiting Ham...
Per-Olof Persson
ACSC
2002
IEEE
14 years 1 months ago
Bracket Capabilities for Distributed Systems Security
The per-method access control lists of standard middleware technologies allow only simple forms of access control to be expressed and enforced. Research systems based on capabilit...
Mark Evered
MDM
2001
Springer
209views Communications» more  MDM 2001»
14 years 1 months ago
Energy-Efficient Transaction Management for Real-Time Mobile Databases in Ad-Hoc Network Environments
In an ad-hoc mobile network architecture, all the mobile hosts (MHs) are connected with each other through a wireless network that has a frequently changing topology. This type of ...
Le Gruenwald, Shankar M. Banik