Sciweavers

2747 search results - page 498 / 550
» Non-oblivious Strategy Improvement
Sort
View
CEC
2010
IEEE
14 years 11 months ago
A novel memetic algorithm for constrained optimization
In this paper, we present a memetic algorithm with novel local optimizer hybridization strategy for constrained optimization. The developed MA consists of multiple cycles. In each ...
Jianyong Sun, Jonathan M. Garibaldi
CONEXT
2009
ACM
14 years 11 months ago
Content availability and bundling in swarming systems
BitTorrent, the immensely popular file swarming system, suffers a fundamental problem: content unavailability. Although swarming scales well to tolerate flash crowds for popular c...
Daniel Sadoc Menasché, Antonio Augusto de A...
FMICS
2010
Springer
14 years 11 months ago
SMT-Based Formal Verification of a TTEthernet Synchronization Function
Abstract. TTEthernet is a communication infrastructure for mixedcriticality systems that integrates dataflow from applications with different criticality levels on a single network...
Wilfried Steiner, Bruno Dutertre
DBSEC
2009
130views Database» more  DBSEC 2009»
14 years 11 months ago
Implementing Reflective Access Control in SQL
Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege in an access control ...
Lars E. Olson, Carl A. Gunter, William R. Cook, Ma...
FSKD
2008
Springer
128views Fuzzy Logic» more  FSKD 2008»
14 years 11 months ago
Applying Fuzzy PROMETHEE Method for Evaluating IS Outsourcing Suppliers
The demand for outsourcing in the information systems (IS) field has become a part of basic corporate strategy and has experienced a considerable growth in recent years. The proce...
Tien-Chin Wang, L. Y. Chen, Ying-Hsiu Chen