Sciweavers

10797 search results - page 1893 / 2160
» Robust control applications
Sort
View
EUC
2005
Springer
15 years 10 months ago
PULSE: A MAC Protocol for RFID Networks
1 The reader collision problem occurs when the signal from one reader interferes with the signal from other readers. Solutions like RTS-CTS are not applicable because a reader may ...
Shailesh M. Birari, Sridhar Iyer
FORMATS
2005
Springer
15 years 10 months ago
Average Reward Timed Games
We consider real-time games where the goal consists, for each player, in maximizing the average amount of reward he or she receives per time unit. We consider zero-sum rewards, so ...
B. Thomas Adler, Luca de Alfaro, Marco Faella
FROCOS
2005
Springer
15 years 10 months ago
Combination of Isabelle/HOL with Automatic Tools
We describe results and status of a sub project of the Verisoft [1] project. While the Verisoft project aims at verification of a complete computer system starting with hardware a...
Sergey Tverdyshev
GECCO
2005
Springer
129views Optimization» more  GECCO 2005»
15 years 10 months ago
Morphing methods in evolutionary design optimization
Design optimization is a well established application field of evolutionary computation. However, standard recombination operators acting on the genotypic representation of the d...
Michael Nashvili, Markus Olhofer, Bernhard Sendhof...
GECCO
2005
Springer
193views Optimization» more  GECCO 2005»
15 years 10 months ago
On the contribution of gene libraries to artificial immune systems
Gene libraries have been added to Artificial Immune Systems in analogy to biological immune systems, but to date no careful study of their effect has been made. This work investig...
Peter Spellward, Tim Kovacs
« Prev « First page 1893 / 2160 Last » Next »