Sciweavers

268 search results - page 29 / 54
» Total Knowledge
Sort
View
CONEXT
2006
ACM
14 years 1 months ago
Shortcuts in a virtual world
We consider the case of a virtual world of peers that are organized in an overlay built by Delaunay Triangulation. Application layer routing is used to determine the path taken in...
Moritz Steiner, Ernst W. Biersack
INFOCOM
2005
IEEE
14 years 1 months ago
Optimizing cost-sensitive trust-negotiation protocols
Trust negotiation is a process that establishes mutual trust by the exchange of digital credentials and/or guiding policies among entities who may have no pre-existing knowledge a...
Weifeng Chen, L. Clarke, James F. Kurose, Donald F...
ISSRE
2005
IEEE
14 years 1 months ago
PORT: A Price-Oriented Reliable Transport Protocol for Wireless Sensor Networks
In wireless sensor networks, to obtain reliability and minimize energy consumption, a dynamic rate-control and congestion-avoidance transport scheme is very important. We notice t...
Yangfan Zhou, Michael R. Lyu
GECCO
2005
Springer
132views Optimization» more  GECCO 2005»
14 years 1 months ago
Greedy, genetic, and greedy genetic algorithms for the quadratic knapsack problem
Augmenting an evolutionary algorithm with knowledge of its target problem can yield a more effective algorithm, as this presentation illustrates. The Quadratic Knapsack Problem e...
Bryant A. Julstrom
MATES
2005
Springer
14 years 1 months ago
Reconciling Agent Ontologies for Web Service Applications
Because there is still no agreed-upon global ontology, Web services supplied by different providers typically have individual and unique semantics, described by independently devel...
Jingshan Huang, Rosa Laura Zavala Gutierrez, Benit...