Sciweavers

2173 search results - page 351 / 435
» The Evolution of the DARWIN System
Sort
View
SMC
2010
IEEE
276views Control Systems» more  SMC 2010»
13 years 8 months ago
A Modified Invasive Weed Optimization Algorithm for training of feed- forward Neural Networks
— Invasive Weed Optimization Algorithm IWO) is an ecologically inspired metaheuristic that mimics the process of weeds colonization and distribution and is capable of solving mul...
Ritwik Giri, Aritra Chowdhury, Arnob Ghosh, Swagat...
PUC
2010
111views more  PUC 2010»
13 years 4 months ago
Identifying and facilitating social interaction with a wearable wireless sensor network
We have designed a highly versatile badge system to facilitate a variety of interaction at large professional or social events and serve as a platform for conducting research into ...
Joseph A. Paradiso, Jonathan Gips, Mathew Laibowit...
SIGOPS
2010
163views more  SIGOPS 2010»
13 years 4 months ago
Automated control of internet services
Finding an efficient configuration for cluster-based multi-tier Internet services is often a difficult task. Moreover, even a good configuration could become obsolete, depending o...
Jean Arnaud
TSE
2010
235views more  TSE 2010»
13 years 4 months ago
DECOR: A Method for the Specification and Detection of Code and Design Smells
Abstract-- Code and design smells are poor solutions to recurring implementation and design problems. They may hinder the evolution of a system by making it hard for software engin...
Naouel Moha, Yann-Gaël Guéhéneu...
ARESEC
2011
119views more  ARESEC 2011»
12 years 10 months ago
Some Security Issues in SCALANCE Wireless Industrial Networks
—We discuss some security weaknesses of Scalance wireless access points and clients. These devices, developed by Siemens, are commonly used for wireless communication in network ...
Marius Cristea, Bogdan Groza, Mihai Iacob