Sciweavers

3031 search results - page 414 / 607
» Investigating human-computer optimization
Sort
View
AINA
2008
IEEE
15 years 5 months ago
An Efficient Tree Structure for Delay Sensitive Data Gathering in Wireless Sensor Networks
It is important to design an energy efficient data gathering tree structure for wireless sensor networks. As for the energy efficiency, network's overall energy consumption an...
Soonmok Kwon, Jeonggyu Kim, Cheeha Kim
159
Voted
ATAL
2006
Springer
15 years 5 months ago
Evaluating bidding strategies for simultaneous auctions
Bidding for multiple items or bundles on online auctions raises challenging problems. We assume that an agent has a valuation function that returns its valuation for an arbitrary ...
Teddy Candale, Sandip Sen
130
Voted
CONEXT
2007
ACM
15 years 5 months ago
Detecting worm variants using machine learning
Network intrusion detection systems typically detect worms by examining packet or flow logs for known signatures. Not only does this approach mean worms cannot be detected until ...
Oliver Sharma, Mark Girolami, Joseph S. Sventek
161
Voted
GLOBECOM
2007
IEEE
15 years 5 months ago
Hardware-Constrained Multi-Channel Cognitive MAC
—Open spectrum systems allow unlicensed secondary users equipped with cognitive radio to opportunistically access the spectrum underutilized by primary users. Cognitive radio has...
Juncheng Jia, Qian Zhang
EVOW
2008
Springer
15 years 5 months ago
A Study of Some Implications of the No Free Lunch Theorem
We introduce the concept of "minimal" search algorithm for a set of functions to optimize. We investigate the structure of closed under permutation (c.u.p.) sets and we c...
Andrea Valsecchi, Leonardo Vanneschi