Sciweavers

1207 search results - page 166 / 242
» Towards optimal k-anonymization
Sort
View
MMNS
2004
167views Multimedia» more  MMNS 2004»
13 years 11 months ago
Bandwidth Constrained IP Multicast Traffic Engineering Without MPLS Overlay
Existing multicast traffic engineering (TE) solutions tend to use explicit routing through MPLS tunnels. In this paper we shift away from this overlay approach and address the band...
Ning Wang, George Pavlou
GEOINFO
2003
13 years 11 months ago
Planning Brazilian Urban Traffic with a Geographic Application Software
Planning and optimizing urban traffic is a difficult problem, with considerable economic and social impacts. The development of suitable software tools to aid municipal governments...
Juliano Lopes de Oliveira, André Constantin...
GECCO
2008
Springer
167views Optimization» more  GECCO 2008»
13 years 10 months ago
Using coevolution to understand and validate game balance in continuous games
We attack the problem of game balancing by using a coevolutionary algorithm to explore the space of possible game strategies and counter strategies. We define balanced games as g...
Ryan E. Leigh, Justin Schonfeld, Sushil J. Louis
GECCO
2008
Springer
201views Optimization» more  GECCO 2008»
13 years 10 months ago
Advanced techniques for the creation and propagation of modules in cartesian genetic programming
The choice of an appropriate hardware representation model is key to successful evolution of digital circuits. One of the most popular models is cartesian genetic programming, whi...
Paul Kaufmann, Marco Platzner
GECCO
2008
Springer
115views Optimization» more  GECCO 2008»
13 years 10 months ago
A genetic programming approach to business process mining
The aim of process mining is to identify and extract process patterns from data logs to reconstruct an overall process flowchart. As business processes become more and more comple...
Chris J. Turner, Ashutosh Tiwari, Jörn Mehnen