Sciweavers

4815 search results - page 622 / 963
» A Pattern Approach to Modeling the Provider Selection Proble...
Sort
View
LOGCOM
2002
142views more  LOGCOM 2002»
15 years 4 months ago
Two Logical Theories of Plan Recognition
We present a logical approach to plan recognition that builds on Kautz's theory of keyhole plan recognition, defined as the problem of inferring descriptions of high-level pl...
Wayne Wobcke
ICPP
2005
IEEE
15 years 10 months ago
Two-Tier Resource Allocation for Slowdown Differentiation on Server Clusters
Slowdown, defined as the ratio of a request’s queueing delay to its service time, is accepted as an important quality of service metric of Internet servers. In this paper, we i...
Xiaobo Zhou, Yu Cai, C. Edward Chow, Marijke F. Au...
CEC
2010
IEEE
14 years 8 months ago
A hybrid genetic algorithm for rescue path planning in uncertain adversarial environment
— Efficient vehicle path planning in hostile environment to carry out rescue or tactical logistic missions remains very challenging. Most approaches reported so far relies on key...
Jean Berger, Khaled Jabeur, Abdeslem Boukhtouta, A...
CISIS
2007
IEEE
15 years 11 months ago
Obtaining Performance Measures through Microbenchmarking in a Peer-to-Peer Overlay Computer
: The availability of enormous amounts of un-used computing power and data storage over the In-ternet makes the development of a globally distributed computing platform, called Ove...
Paolo Bertasi, Mauro Bianco, Andrea Pietracaprina,...
VISUALIZATION
2003
IEEE
15 years 10 months ago
Visualization, Optimization, and Business Strategy: A Case Study
We describe a visualization application intended for operational use in formulating business strategy in the customer service arena. The visualization capability provided in this ...
Donna L. Gresh, Eugene I. Kelton