Sciweavers

940 search results - page 97 / 188
» Rules and Strategies in Java
Sort
View
87
Voted
ICC
2007
IEEE
129views Communications» more  ICC 2007»
15 years 7 months ago
Performance Evaluation of CDMA Cellular Systems Considering both the Soft Capacity Constraint and Users' Smooth Random Mobility
— A new call admission control (CAC) strategy based on the soft capacity constraint (SCC) concept is proposed for CDMA cellular systems. The use of the SCC concept allows maximiz...
Carmen B. Rodríguez-Estrello, Felipe A. Cru...
102
Voted
ICIAP
2005
ACM
15 years 6 months ago
Score Selection Techniques for Fingerprint Multi-modal Biometric Authentication
Abstract. Fingerprints are one of the most used biometrics for automatic personal authentication. Unfortunately, it is often difficult to design fingerprint matchers exhibiting th...
Giorgio Giacinto, Fabio Roli, Roberto Tronci
129
Voted
AMET
1998
Springer
15 years 4 months ago
Evolutionary Computing and Negotiating Agents
Automated negotiation has been of particular interest due to the relevant role that negotiation plays among trading agents. This paper presents two types of agent architecture: Cas...
Noyda Matos, Carles Sierra
GECCO
2010
Springer
195views Optimization» more  GECCO 2010»
15 years 4 months ago
Improved step size adaptation for the MO-CMA-ES
The multi-objective covariance matrix adaptation evolution strategy (MO-CMA-ES) is an evolutionary algorithm for continuous vector-valued optimization. It combines indicator-based...
Thomas Voß, Nikolaus Hansen, Christian Igel
94
Voted
ARGMAS
2006
Springer
15 years 4 months ago
An Argumentation-Based Approach for Dialog Move Selection
Abstract. Modeling different types of dialog between autonomous agents is becoming an important research issue. Several proposals exist with a clear definition of the dialog protoc...
Leila Amgoud, Nabil Hameurlain