Sciweavers

1663 search results - page 319 / 333
» Computer Security in the Real World
Sort
View
GECCO
2004
Springer
164views Optimization» more  GECCO 2004»
15 years 7 months ago
Fuzzy Dominance Based Multi-objective GA-Simplex Hybrid Algorithms Applied to Gene Network Models
Hybrid algorithms that combine genetic algorithms with the Nelder-Mead simplex algorithm have been effective in solving certain optimization problems. In this article, we apply a s...
Praveen Koduru, Sanjoy Das, Stephen Welch, Judith ...
KDD
2004
ACM
161views Data Mining» more  KDD 2004»
15 years 7 months ago
ANN quality diagnostic models for packaging manufacturing: an industrial data mining case study
World steel trade becomes more competitive every day and new high international quality standards and productivity levels can only be achieved by applying the latest computational...
Nicolás de Abajo, Alberto B. Diez, Vanesa L...
HICSS
2003
IEEE
146views Biometrics» more  HICSS 2003»
15 years 7 months ago
A Model for the Emergence and Diffusion of Software Standards
The economic impact of the growth dynamic of standards is often described from a macroeconomic point of view, employing network effect theory and models dealing with externalities...
Tim Stockheim, Michael Schwind, Wolfgang Köni...
ICNP
2003
IEEE
15 years 7 months ago
Data Dissemination with Ring-Based Index for Wireless Sensor Networks
In current sensor networks, sensor nodes are capable of not only measuring real world phenomena, but also storing, processing and transferring these measurements. Many data dissem...
Wensheng Zhang, Guohong Cao, Thomas F. La Porta
SAINT
2003
IEEE
15 years 7 months ago
Mobile Agent based realization of a distance evaluation system
The growth of the Internet has led to new avenues for distance education. A crucial factor for the success of distance education is effective mechanisms for distance evaluation. E...
Vikram Jamwal, Sridhar Iyer