Sciweavers

732 search results - page 103 / 147
» Critical control of a genetic algorithm
Sort
View
HASE
2008
IEEE
15 years 7 months ago
Low Cost Secure Computation for the General Client-Server Computation Model
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
Liangliang Xiao, I-Ling Yen, Farokh B. Bastani
107
Voted
BMCBI
2011
14 years 7 months ago
An Agent-Based Model to study the epidemiological and evolutionary dynamics of Influenza viruses
Background: Influenza A viruses exhibit complex epidemiological patterns in a number of mammalian and avian hosts. Understanding transmission of these viruses necessitates taking ...
Benjamin Roche, John M. Drake, Pejman Rohani
97
Voted
PODS
2002
ACM
154views Database» more  PODS 2002»
16 years 21 days ago
How to Evaluate Multiple Range-Sum Queries Progressively
Decision support system users typically submit batches of range-sum queries simultaneously rather than issuing individual, unrelated queries. We propose a wavelet based technique ...
Rolfe R. Schmidt, Cyrus Shahabi
IJRA
2011
101views more  IJRA 2011»
14 years 7 months ago
Information Surfing for Radiation Map Building
We develop a control scheme for a group of mobile sensors to map radiation over a given planar polygonal region. The advantage of this methodology is that it provides quick situat...
R. Andres Cortez, Herbert G. Tanner, Ron Lumia, Ch...
105
Voted
DAC
2005
ACM
16 years 1 months ago
Enhanced leakage reduction Technique by gate replacement
Input vector control (IVC) technique utilizes the stack effect in CMOS circuit to apply the minimum leakage vector (MLV) to the circuit at the sleep mode to reduce leakage. Additi...
Lin Yuan, Gang Qu