Sciweavers

14078 search results - page 2795 / 2816
» Design and Analysis of Computer Algorithms
Sort
View
83
Voted
COLCOM
2007
IEEE
15 years 3 months ago
Cooperative security in distributed sensor networks
— Distributed sensor network protocols, such as routing, time synchronization or data aggregation protocols make use of collaborative techniques to minimize the consumption of sc...
Oscar García Morchon, Heribert Baldus, Tobi...
LCN
2007
IEEE
15 years 3 months ago
Achieving True Video-on-Demand Service in Multi-Hop WiMax Mesh Networks
Abstract—In this work, we discuss how to support Video-onDemand service in multi-hop WiMax mesh networks. We are interested in the scenario that end users connect to the video se...
Fei Xie, Kien A. Hua, Ning Jiang
SACI
2007
IEEE
15 years 3 months ago
Geometric Theory and Control of Linear Parameter Varying Systems
: Linear Parameter Varying(LPV) systems appear in a form of LTI state space representations where the elements of the A(ρ), B(ρ), C(ρ) matrices can depend on an unknown but at a...
Jozsef Bokor
94
Voted
GECCO
2007
Springer
182views Optimization» more  GECCO 2007»
15 years 3 months ago
Generating large-scale neural networks through discovering geometric regularities
Connectivity patterns in biological brains exhibit many repeating motifs. This repetition mirrors inherent geometric regularities in the physical world. For example, stimuli that ...
Jason Gauci, Kenneth O. Stanley
GECCO
2007
Springer
151views Optimization» more  GECCO 2007»
15 years 3 months ago
Solving real-valued optimisation problems using cartesian genetic programming
Classical Evolutionary Programming (CEP) and Fast Evolutionary Programming (FEP) have been applied to realvalued function optimisation. Both of these techniques directly evolve th...
James Alfred Walker, Julian Francis Miller
« Prev « First page 2795 / 2816 Last » Next »