Sciweavers

4491 search results - page 274 / 899
» Algorithm Engineering
Sort
View
ICNC
2005
Springer
15 years 8 months ago
Harmony Search for Generalized Orienteering Problem: Best Touring in China
In order to overcome the drawbacks of mathematical optimization techniques, soft computing algorithms have been vigorously introduced during the past decade. However, there are sti...
Zong Woo Geem, Chung-Li Tseng, Yongjin Park
FASE
2009
Springer
15 years 10 months ago
A Formal Connection between Security Automata and JML Annotations
Security automata are a convenient way to describe security policies. Their typical use is to monitor the execution of an application, and to interrupt it as soon as the security p...
Marieke Huisman, Alejandro Tamalet
AH
2008
Springer
15 years 9 months ago
Automatic Generation of User Adapted Learning Designs: An AI-Planning Proposal
Abstract. A Learning Design(LD) definition under the IMS-LD standard is a complex task for the instructor because it requires a lot of time, effort and previous knowledge of the ...
Lluvia Morales, Luis A. Castillo, Juan Ferná...
CISSE
2008
Springer
15 years 5 months ago
Anonymity Leakage Reduction in Network Latency
Each Internet communication leaves trails here or there, that can be followed back to the user. Notably, anonymous communication schemes are purposed to hide users' identity ...
Longy O. Anyanwu, Jared Keengwe, Gladys A. Arome
LOGCOM
2008
120views more  LOGCOM 2008»
15 years 3 months ago
Reconstructing an Agent's Epistemic State from Observations about its Beliefs and Non-beliefs
We look at the problem in belief revision of trying to make inferences about what an agent believed--or will believe--at a given moment, based on an observation of how the agent h...
Richard Booth, Alexander Nittka