Sciweavers

86 search results - page 3 / 18
» A control strategy for operating unknown constrained mechani...
Sort
View
EUSFLAT
2003
165views Fuzzy Logic» more  EUSFLAT 2003»
13 years 7 months ago
Genetic fuzzy systems to evolve coordination strategies in competitive distributed systems
This paper suggests an evolutionary approach to design coordination strategies, a key issue in distributed intelligent systems. We focus on competitive strategies in the form of f...
Igor Walter, Fernando A. C. Gomide
CN
1999
74views more  CN 1999»
13 years 5 months ago
FIPA-compliant agents for real-time control of Intelligent Network traffic
Autonomy, adaptability, scalability, and flexible communications are all attributes of agents and multi-agent systems which suggest that they may offer timely solutions for dealin...
Brendan Jennings, Rob Brennan, Rune Gustavsson, Ro...
GECCO
2007
Springer
168views Optimization» more  GECCO 2007»
13 years 12 months ago
Sex and death: towards biologically inspired heuristics for constraint handling
Constrained continuous optimization is still an interesting field of research. Many heuristics have been proposed in the last decade. Most of them are based on penalty functions....
Oliver Kramer, Stephan Brügger, Dejan Lazovic
CSE
2009
IEEE
14 years 16 days ago
A Framework for Enforcing Constrained RBAC Policies
—Constraints are an important part of role-based access control policies. The safety or security of a system is maintained by enforcing constraints that are specified in the pol...
Jason Crampton, Hemanth Khambhammettu
SEC
2008
13 years 7 months ago
HoneyID : Unveiling Hidden Spywares by Generating Bogus Events
A particular type of spyware which uses the user's events covertly, such as keyloggers and password stealers, has become a big threat to Internet users. Due to the prevalence ...
Jeheon Han, Jonghoon Kwon, Heejo Lee