Sciweavers

16513 search results - page 3055 / 3303
» Numerical Analysis Methods
Sort
View
GECCO
2011
Springer
232views Optimization» more  GECCO 2011»
14 years 7 months ago
Mutation rates of the (1+1)-EA on pseudo-boolean functions of bounded epistasis
When the epistasis of the fitness function is bounded by a constant, we show that the expected fitness of an offspring of the (1+1)-EA can be efficiently computed for any point...
Andrew M. Sutton, Darrell Whitley, Adele E. Howe
INFOCOM
2011
IEEE
14 years 7 months ago
Implications of device diversity for organic localization
—Many indoor localization methods are based on the association of 802.11 wireless RF signals from wireless access points (WAPs) with location labels. An “organic” RF position...
Jun-geun Park, Dorothy Curtis, Seth J. Teller, Jon...
INFOCOM
2011
IEEE
14 years 7 months ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao
IWMM
2011
Springer
217views Hardware» more  IWMM 2011»
14 years 7 months ago
On the theory and potential of LRU-MRU collaborative cache management
The goal of cache management is to maximize data reuse. Collaborative caching provides an interface for software to communicate access information to hardware. In theory, it can o...
Xiaoming Gu, Chen Ding
JCDL
2011
ACM
374views Education» more  JCDL 2011»
14 years 7 months ago
Comparative evaluation of text- and citation-based plagiarism detection approaches using guttenplag
Various approaches for plagiarism detection exist. All are based on more or less sophisticated text analysis methods such as string matching, fingerprinting or style comparison. I...
Bela Gipp, Norman Meuschke, Jöran Beel
« Prev « First page 3055 / 3303 Last » Next »