Sciweavers

10907 search results - page 218 / 2182
» Constraint Based Strategies
Sort
View
ICC
2008
IEEE
143views Communications» more  ICC 2008»
15 years 5 months ago
A Closed-Form Expression for Static Worm-Scanning Strategies
—This work presents a closed-form expression for characterizing the spread of static worm-scanning strategies through a mean-field approximation. Our model can both accurately c...
Zesheng Chen, Chao Chen
ISCC
2007
IEEE
15 years 5 months ago
Analysis of Load Dependency of Handover Strategies in Mobile Multiaccess Ambient Networks
Wireless operators incorporate multiradio access technologies aiming at expanding their customer base and benefiting from synergies of existing and planned infrastructure. The res...
Petteri Pöyhönen, Daniel Hollos, Haitao ...
GECCO
2010
Springer
193views Optimization» more  GECCO 2010»
15 years 3 months ago
Fitness-AUC bandit adaptive strategy selection vs. the probability matching one within differential evolution: an empirical comp
The choice of which of the available strategies should be used within the Differential Evolution algorithm for a given problem is not trivial, besides being problem-dependent and...
Álvaro Fialho, Marc Schoenauer, Michè...
97
Voted
ECIR
1998
Springer
15 years 6 days ago
Independence of Contributing Retrieval Strategies in Data Fusion for Effective Information Retrieval
: In information retrieval, data fusion is a technique for combining the outputs of more than one retrieval strategy which rank documents for retrieval. One of the observations oft...
Alan F. Smeaton
GLOBECOM
2008
IEEE
15 years 5 months ago
Channel Adaptive Encoding and Decoding Strategies and Rate Regions for the Three User Cooperative Multiple Access Channel
—For a cooperative Gaussian multiple access channel (MAC), we propose a new channel adaptive three user cooperation strategy, based on a non-trivial extension of block Markov sup...
Çagatay Edemen, Onur Kaya