Sciweavers

1356 search results - page 150 / 272
» Some New Results on Inverse Sorting Problems
Sort
View
GECCO
2004
Springer
103views Optimization» more  GECCO 2004»
14 years 2 months ago
Using a Genetic Algorithm to Design and Improve Storage Area Network Architectures
Abstract. Designing storage area networks is an NP-hard problem. Previous work has focused on traditional algorithmic techniques to automatically determine fabric requirements, net...
Elizabeth Dicke, Andrew Byde, Paul J. Layzell, Dav...
GI
2004
Springer
14 years 2 months ago
On the Use of Structured P2P Indexing Mechanisms in Mobile Ad-Hoc Scenarios
Abstract: Recently, Distributed Hash Tables evolved to a preferred approach for decentralized data management in widely distributed systems. Due to their crucial characteristics â€...
Tobias Heer, Heiko Niedermayer, Leo Petrak, Simon ...
ICCSA
2004
Springer
14 years 2 months ago
Network Probabilistic Connectivity: Exact Calculation with Use of Chains
The algorithmic techniques which allow high efficiency in the precise calculation of the reliability of an undirected graph with absolutely reliable nodes and unreliable edges are ...
Olga K. Rodionova, Alexey S. Rodionov, Hyunseung C...
PPSN
2004
Springer
14 years 2 months ago
LS-CMA-ES: A Second-Order Algorithm for Covariance Matrix Adaptation
Abstract. Evolution Strategies, Evolutionary Algorithms based on Gaussian mutation and deterministic selection, are today considered the best choice as far as parameter optimizatio...
Anne Auger, Marc Schoenauer, Nicolas Vanhaecke
AINA
2010
IEEE
14 years 2 months ago
Against Spyware Using CAPTCHA in Graphical Password Scheme
—Text-based password schemes have inherent security and usability problems, leading to the development of graphical password schemes. However, most of these alternate schemes are...
Liming Wang, Xiuling Chang, Zhongjie Ren, Haichang...