Sciweavers

3319 search results - page 606 / 664
» The topology of dark networks
Sort
View
WWW
2003
ACM
14 years 4 months ago
WS-Membership - Failure Management in a Web-Services World
An important factor in the successful deployment of federated web-services-based business activities will be the ability to guarantee reliable distributed operation and execution....
Werner Vogels, Christopher Ré
GECCO
2009
Springer
199views Optimization» more  GECCO 2009»
14 years 3 months ago
Using behavioral exploration objectives to solve deceptive problems in neuro-evolution
Encouraging exploration, typically by preserving the diversity within the population, is one of the most common method to improve the behavior of evolutionary algorithms with dece...
Jean-Baptiste Mouret, Stéphane Doncieux
APNOMS
2006
Springer
14 years 2 months ago
"P4L": A Four Layers P2P Model for Optimizing Resources Discovery and Localization
Peer-to-Peer systems are based on the concept of resources localization and mutualization in dynamic context. In specific environment such as mobile networks, characterized by high...
Mourad Amad, Ahmed Meddahi
BMCBI
2010
118views more  BMCBI 2010»
13 years 11 months ago
Identifying differentially regulated subnetworks from phosphoproteomic data
Background: Various high throughput methods are available for detecting regulations at the level of transcription, translation or posttranslation (e.g. phosphorylation). Integrati...
Martin Klammer, Klaus Godl, Andreas Tebbe, Christo...
CACM
2005
74views more  CACM 2005»
13 years 11 months ago
Separate handles from names on the internet
Networked communications inherently depend on the ability of the sender of a message to indicate through some token how the message should be delivered to a particular recipient. ...
Michael J. O'Donnell