Sciweavers

5344 search results - page 218 / 1069
» Privacy-Preserving Set Operations
Sort
View
130
Voted
ICDCSW
2006
IEEE
15 years 9 months ago
Evaluation of Unstructured Overlay Maintenance Protocols under Churn
An overlay network is formed on top of – and generally independently from – the underlying physical computer network, by the peers (nodes) of a P2P system. The dynamics of pee...
Roberto Baldoni, Silvia Bonomi, Adriano Rippa, Leo...
121
Voted
CEC
2005
IEEE
15 years 9 months ago
Single parent genetic programming
The most controversial part of genetic programming is its highly disruptive and potentially innovative subtree crossover operator. The clearest problem with the crossover operator...
Wendy Ashlock, Dan Ashlock
QSHINE
2005
IEEE
15 years 9 months ago
Grido- An Architecture for a Grid-based Overlay Network
— Grido is an architecture that targets a network operator intending to provide enhanced services to its customers. This is achieved by setting up a “backbone” overlay networ...
Shirshanka Das, Alok Nandan, Michael G. Parker, Gi...
141
Voted
GECCO
2005
Springer
120views Optimization» more  GECCO 2005»
15 years 9 months ago
Exploiting gradient information in numerical multi--objective evolutionary optimization
Various multi–objective evolutionary algorithms (MOEAs) have obtained promising results on various numerical multi– objective optimization problems. The combination with gradi...
Peter A. N. Bosman, Edwin D. de Jong
148
Voted
LPAR
2005
Springer
15 years 9 months ago
Comparative Similarity, Tree Automata, and Diophantine Equations
The notion of comparative similarity ‘X is more similar or closer to Y than to Z’ has been investigated in both foundational and applied areas of knowledge representation and r...
Mikhail Sheremet, Dmitry Tishkovsky, Frank Wolter,...