Sciweavers

1784 search results - page 209 / 357
» Comparing designs for computer simulation experiments
Sort
View
DCOSS
2010
Springer
15 years 8 months ago
ZeroCal: Automatic MAC Protocol Calibration
Sensor network MAC protocols are typically configured for an intended deployment scenario once and for all at compile time. This approach, however, leads to suboptimal performance...
Andreas Meier, Matthias Woehrle, Marco Zimmerling,...
GECCO
2010
Springer
183views Optimization» more  GECCO 2010»
15 years 8 months ago
Neuroevolution of mobile ad hoc networks
This paper describes a study of the evolution of distributed behavior, specifically the control of agents in a mobile ad hoc network, using neuroevolution. In neuroevolution, a p...
David B. Knoester, Heather Goldsby, Philip K. McKi...
AINA
2004
IEEE
15 years 7 months ago
Balancing Workload based on Content Types for Scalable Web Server Clusters
With the rapid growth of information stored in worldwide web servers, searching and capturing data on Internet become a common behavior for us. In order to increase the availabili...
Tzung-Shi Chen, Kuo-Lian Chen
CSE
2009
IEEE
15 years 6 months ago
Using Qtag to Extract Dominant Public Opinion in Very Large-Scale Conversation
— These days VLSC (Very Large-Scale Conversation) is a particular type of online conversation, that is large scale, public, text-based, many-to-many and persistent. The nature of...
Sung Eob Lee, Taeksoo Chun, Steve SangKi Han
WORM
2004
15 years 4 months ago
ACT: attachment chain tracing scheme for email virus detection and control
Modern society is highly dependent on the smooth and safe flow of information over communication and computer networks. Computer viruses and worms pose serious threats to the soci...
Jintao Xiong