Sciweavers

10568 search results - page 1798 / 2114
» Computer Intelligence and Formalization
Sort
View
139
Voted
CSE
2009
IEEE
15 years 11 months ago
Collaborative Mining in Multiple Social Networks Data for Criminal Group Discovery
—The hidden knowledge in social networks data can be regarded as an important resource for criminal investigations which can help finding the structure and organization of a crim...
Amin Milani Fard, Martin Ester
ICDCSW
2009
IEEE
15 years 11 months ago
A Straightforward Path Routing in Wireless Ad Hoc Sensor Networks
Building a “Straightforward” path in wireless ad hoc sensor networks (WASNs) not only avoids wasting energy in detours, but also incurs less interference in other transmission...
Zhen Jiang, Junchao Ma, Wei Lou, Jie Wu
146
Voted
ICPPW
2009
IEEE
15 years 11 months ago
Load Balancing Concurrent BPEL Processes by Dynamic Selection of Web Service Endpoints
Business workflows implemented as BPEL processes play an important role for many business applications. BPEL is used to orchestrate a series of Web service calls. Which provider ...
Marvin Ferber, Sascha Hunold, Thomas Rauber
149
Voted
AGS
2009
Springer
15 years 11 months ago
Pogamut 3 Can Assist Developers in Building AI (Not Only) for Their Videogame Agents
Many research projects oriented on control mechanisms of virtual agents in videogames have emerged in recent years. However, this boost has not been accompanied with the emergence ...
Jakub Gemrot, Rudolf Kadlec, Michal Bída, O...
136
Voted
EMO
2009
Springer
155views Optimization» more  EMO 2009»
15 years 11 months ago
A Hybrid Integrated Multi-Objective Optimization Procedure for Estimating Nadir Point
A nadir point is constructed by the worst objective values of the solutions of the entire Pareto-optimal set. Along with the ideal point, the nadir point provides the range of obje...
Kalyanmoy Deb, Kaisa Miettinen, Deepak Sharma
« Prev « First page 1798 / 2114 Last » Next »