Sciweavers

3031 search results - page 308 / 607
» Investigating human-computer optimization
Sort
View
GECCO
2010
Springer
194views Optimization» more  GECCO 2010»
15 years 8 months ago
Mirrored variants of the (1, 2)-CMA-ES compared on the noisy BBOB-2010 testbed
Derandomization by means of mirrored samples has been recently introduced to enhance the performances of (1, λ) and (1 + 2) Evolution-Strategies (ESs) with the aim of designing f...
Anne Auger, Dimo Brockhoff, Nikolaus Hansen
ICDE
1996
IEEE
178views Database» more  ICDE 1996»
16 years 5 months ago
Query Folding
Query folding refers to the activity of determining if and how a query can be answered using a given set of resources, which might be materialized views, cached results of previou...
Xiaolei Qian
STOC
2003
ACM
153views Algorithms» more  STOC 2003»
16 years 4 months ago
Sublinear geometric algorithms
We initiate an investigation of sublinear algorithms for geometric problems in two and three dimensions. We give optimal algorithms for intersection detection of convex polygons a...
Bernard Chazelle, Ding Liu, Avner Magen
VMCAI
2010
Springer
16 years 1 months ago
Best Probabilistic Transformers
This paper investigates relative precision and optimality of analyses for concurrent probabilistic systems. Aiming at the problem at the heart of probabilistic model checking ? com...
Björn Wachter, Lijun Zhang
263
Voted
ACCESSNETS
2009
Springer
15 years 10 months ago
SWIM: A Scheduler for Unsolicited Grant Service (UGS) in IEEE 802.16e Mobile WiMAX Networks
Most of the IEEE 802.16e Mobile WiMAX scheduling proposals for real-time traffic using Unsolicited Grant Service (UGS) focus on the throughput and guaranteed latency. The delay jit...
Chakchai So-In, Raj Jain, Abdel Karim Al Tamimi