Sciweavers

15073 search results - page 2960 / 3015
» Probabilistic algorithms for computing resultants
Sort
View
WIMOB
2008
IEEE
15 years 4 months ago
A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks
—To avoid the single point of failure for the certificate authority (CA) in MANET, a decentralized solution is proposed where nodes are grouped into different clusters. Each clu...
Abderrezak Rachedi, Abderrahim Benslimane, Hadi Ot...
ICRA
2007
IEEE
189views Robotics» more  ICRA 2007»
15 years 4 months ago
Stereo-based Markerless Human Motion Capture for Humanoid Robot Systems
Abstract— In this paper, we present an image-based markerless human motion capture system, intended for humanoid robot systems. The restrictions set by this ambitious goal are nu...
Pedram Azad, Ales Ude, Tamim Asfour, Rüdiger ...
GECCO
2007
Springer
151views Optimization» more  GECCO 2007»
15 years 3 months ago
Solving real-valued optimisation problems using cartesian genetic programming
Classical Evolutionary Programming (CEP) and Fast Evolutionary Programming (FEP) have been applied to realvalued function optimisation. Both of these techniques directly evolve th...
James Alfred Walker, Julian Francis Miller
GECCO
2007
Springer
181views Optimization» more  GECCO 2007»
15 years 3 months ago
ACOhg: dealing with huge graphs
Ant Colony Optimization (ACO) has been successfully applied to those combinatorial optimization problems which can be translated into a graph exploration. Artificial ants build s...
Enrique Alba, J. Francisco Chicano
GECCO
2007
Springer
179views Optimization» more  GECCO 2007»
15 years 3 months ago
A destructive evolutionary process: a pilot implementation
This paper describes the application of evolutionary search to the problem of Flash memory wear-out. The operating parameters of Flash memory are notoriously difficult to determin...
Joe Sullivan, Conor Ryan
« Prev « First page 2960 / 3015 Last » Next »