Sciweavers

639 search results - page 93 / 128
» Dominance Constraints with Set Operators
Sort
View
CEC
2009
IEEE
15 years 11 months ago
Performance assessment of the hybrid Archive-based Micro Genetic Algorithm (AMGA) on the CEC09 test problems
— In this paper, the performance assessment of the hybrid Archive-based Micro Genetic Algorithm (AMGA) on a set of bound-constrained synthetic test problems is reported. The hybr...
Santosh Tiwari, Georges Fadel, Patrick Koch, Kalya...
IDEAS
2008
IEEE
105views Database» more  IDEAS 2008»
15 years 10 months ago
Pruning attribute values from data cubes with diamond dicing
Data stored in a data warehouse are inherently multidimensional, but most data-pruning techniques (such as iceberg and top-k queries) are unidimensional. However, analysts need to...
Hazel Webb, Owen Kaser, Daniel Lemire
TASE
2008
IEEE
15 years 10 months ago
Reasoning about Channel Passing in Choreography
Abstract Web services choreography describes global models of service interactions among a set of participants. For an interaction to be executed, the participants taken part in it...
Hongli Yang, Chao Cai, Liyang Peng, Xiangpeng Zhao...
FUZZIEEE
2007
IEEE
15 years 10 months ago
Soft Target Based Obstacle Avoidance for Car-like Mobile Robot in Dynamic Environment
— The real time flexible operation of a car-like mobile robot with nonholonomic constraints in dynamic environment is still a very challenging problem. The difficulty lies in t...
Yougen Chen, Seiji Yasunobu
ICARIS
2007
Springer
15 years 10 months ago
An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Comp
Today’s signature-based intrusion detection systems are reactive in nature and storage-limited. Their operation depends upon catching an instance of an intrusion or virus and en...
Charles R. Haag, Gary B. Lamont, Paul D. Williams,...