Sciweavers

2861 search results - page 416 / 573
» The multi-layered network design problem
Sort
View
GECCO
2011
Springer
264views Optimization» more  GECCO 2011»
13 years 2 months ago
Critical factors in the performance of novelty search
Novelty search is a recently proposed method for evolutionary computation designed to avoid the problem of deception, in which the fitness function guides the search process away...
Steijn Kistemaker, Shimon Whiteson
IAAI
1993
14 years 15 hour ago
COMPAQ QuickSource: Providing the Consumer with the Power of Artificial Intelligence
This paper describes COMPAQ QuickSource, an electronic problem-solving and information system for Compaq’s line of networked printers. A major goal in designing this system was ...
Trung Nguyen, Mary Czerwinski, Dan Lee
IPSN
2007
Springer
14 years 4 months ago
Interface contracts for TinyOS
TinyOS applications are built with software components that communicate through narrow interfaces. Since components enable finegrained code reuse, this approach has been successf...
Will Archer, Philip Levis, John Regehr
ACMSE
2006
ACM
14 years 4 months ago
Security issues in privacy and key management protocols of IEEE 802.16
Without physical boundaries, a wireless network faces many more security threats than a wired network does. Therefore, in the IEEE 802.16 standard a security sublayer is specified...
Sen Xu, Manton M. Matthews, Chin-Tser Huang
MOBISYS
2007
ACM
14 years 10 months ago
Preserving location privacy in wireless lans
The broadcast and tetherless nature of wireless networks and the widespread deployment of Wi-Fi hotspots makes it easy to remotely locate a user by observing her wireless signals....
Tao Jiang, Helen J. Wang, Yih-Chun Hu