Sciweavers

156 search results - page 30 / 32
» pr 2007
Sort
View
ICSNC
2007
IEEE
14 years 2 months ago
Using the mobile phone as a security token for unified authentication
- The number of different identities and credentials used for authentication towards services on the Internet has increased beyond the manageable. Still, the most common authentica...
Steffen Hallsteinsen, Ivar Jørstad, Do Van ...
GECCO
2007
Springer
181views Optimization» more  GECCO 2007»
14 years 1 months ago
A study on metamodeling techniques, ensembles, and multi-surrogates in evolutionary computation
Surrogate-Assisted Memetic Algorithm(SAMA) is a hybrid evolutionary algorithm, particularly a memetic algorithm that employs surrogate models in the optimization search. Since mos...
Dudy Lim, Yew-Soon Ong, Yaochu Jin, Bernhard Sendh...
MSN
2007
Springer
130views Sensor Networks» more  MSN 2007»
14 years 1 months ago
Localized Mobility Control Routing in Robotic Sensor Wireless Networks
The paper addresses mobility control routing in robotic sensor wireless networks, where either mobile sensors or mobile actuators assist in wireless data intensive transmissions fr...
Hai Liu, Amiya Nayak, Ivan Stojmenovic
WSC
2007
13 years 10 months ago
A test implementation of the core manufacturing simulation data specification
This paper describes an effort of testing the Core Manufacturing Simulation Data (CMSD) information model as a neutral data interface for a discrete event simulation model develop...
Marcus Johansson, Björn Johansson, Anders Sko...
CIE
2007
Springer
13 years 9 months ago
Constructive Dimension and Weak Truth-Table Degrees
This paper examines the constructive Hausdorff and packing dimensions of weak truth-table degrees. The main result is that every infinite sequence S with constructive Hausdorff...
Laurent Bienvenu, David Doty, Frank Stephan