Sciweavers

5133 search results - page 623 / 1027
» Optimization in Object Caching
Sort
View
ADHOCNETS
2009
Springer
15 years 9 months ago
Power-Aware Intrusion Detection in Mobile Ad Hoc Networks
Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion ...
Sevil Sen, John A. Clark, Juan E. Tapiador
GECCO
2009
Springer
170views Optimization» more  GECCO 2009»
15 years 9 months ago
Benchmarking a BI-population CMA-ES on the BBOB-2009 noisy testbed
We benchmark the BI-population CMA-ES on the BBOB2009 noisy functions testbed. BI-population refers to a multistart strategy with equal budgets for two interlaced restart strategi...
Nikolaus Hansen
151
Voted
PCM
2009
Springer
188views Multimedia» more  PCM 2009»
15 years 9 months ago
Nonlocal Edge-Directed Interpolation
In this paper, we proposed a new edge-directed image interpolation algorithm which can preserve the edge features and natural appearance of images efficiently. In the proposed sche...
Xinfeng Zhang, Siwei Ma, Yongbing Zhang, Li Zhang,...
EMO
2001
Springer
132views Optimization» more  EMO 2001»
15 years 9 months ago
Multi-objective Evolutionary Design of Fuzzy Autopilot Controller
Abstract. A multi-objective evolutionary algorithm is used to determine the membership function distribution within the outer loop control system of a non-linear missile autopilot ...
Anna L. Blumel, Evan J. Hughes, Brian A. White
130
Voted
HICSS
2000
IEEE
208views Biometrics» more  HICSS 2000»
15 years 9 months ago
Transfer Capability Computations in Deregulated Power Systems
With the recent trend towards deregulating power systems around the world, transfer capability computation emerges as the key issue to a smoothly running power market with multipl...
Mohamed Shaaban, Yixin Ni, Felix F. Wu