Sciweavers

CORR
2008
Springer
132views Education» more  CORR 2008»
13 years 8 months ago
Building Better Nurse Scheduling Algorithms
The aim of this research is twofold: Firstly, to model and solve a complex nurse scheduling problem with an integer programming formulation and evolutionary algorithms. Secondly, ...
Uwe Aickelin, Paul White
CORR
2008
Springer
121views Education» more  CORR 2008»
13 years 8 months ago
On the Application of Hierarchical Coevolutionary Genetic Algorithms: Recombination and Evaluation Partners
This paper examines the use of a hierarchical coevolutionary genetic algorithm under different partnering strategies. Cascading clusters of sub-populations are built from the bott...
Uwe Aickelin, Larry Bull
CORR
2008
Springer
90views Education» more  CORR 2008»
13 years 8 months ago
An Indirect Genetic Algorithm for Set Covering Problems
This paper presents a new type of genetic algorithm for the set covering problem. It differs from previous evolutionary approaches first because it is an indirect algorithm, i.e. ...
Uwe Aickelin
CORR
2008
Springer
110views Education» more  CORR 2008»
13 years 8 months ago
Enhanced Direct and Indirect Genetic Algorithm Approaches for a Mall Layout and Tenant Selection Problem
During our earlier research, it was recognised that in order to be successful with an indirect genetic algorithm approach using a decoder, the decoder has to strike a balance betw...
Uwe Aickelin, Kathryn A. Dowsland
CORR
2008
Springer
112views Education» more  CORR 2008»
13 years 8 months ago
Minimal weight expansions in Pisot bases
For applications to cryptography, it is important to represent numbers with a small number of non-zero digits (Hamming weight) or with small absolute sum of digits. The problem of ...
Christiane Frougny, Wolfgang Steiner
CORR
2008
Springer
147views Education» more  CORR 2008»
13 years 8 months ago
Impact of CSI on Distributed Space-Time Coding in Wireless Relay Networks
We consider a two-hop wireless network where a transmitter communicates with a receiver via M relays with an amplify-and-forward (AF) protocol. Recent works have shown that sophis...
Mari Kobayashi, Xavier Mestre
CORR
2008
Springer
101views Education» more  CORR 2008»
13 years 8 months ago
Unequal Error Protection: Some Fundamental Limits
Various scenarios are considered where some information is more important than other and needs better protection. A general theoretical framework for unequal error protection is d...
Shashi Borade, Baris Nakiboglu, Lizhong Zheng
CORR
2008
Springer
59views Education» more  CORR 2008»
13 years 8 months ago
Logical Queries over Views: Decidability and Expressiveness
James Bailey, Guozhu Dong, Anthony Widjaja To
CORR
2008
Springer
102views Education» more  CORR 2008»
13 years 8 months ago
SAFIUS - A secure and accountable filesystem over untrusted storage
We describe SAFIUS, a secure accountable file system that resides over an untrusted storage. SAFIUS provides strong security guarantees like confidentiality, integrity, prevention ...
V. Sriram, Ganesh M. Narayan, K. Gopinath
CORR
2008
Springer
136views Education» more  CORR 2008»
13 years 8 months ago
Data Fusion Trees for Detection: Does Architecture Matter?
We consider the problem of decentralized detection in a network consisting of a large number of nodes arranged as a tree of bounded height, under the assumption of conditionally in...
Wee-Peng Tay, John N. Tsitsiklis, Moe Z. Win