Sciweavers

628 search results - page 87 / 126
» Scheduling Algorithm with Potential Behaviors
Sort
View
PPOPP
2005
ACM
15 years 5 months ago
Trust but verify: monitoring remotely executing programs for progress and correctness
The increased popularity of grid systems and cycle sharing across organizations requires scalable systems that provide facilities to locate resources, to be fair in the use of tho...
Shuo Yang, Ali Raza Butt, Y. Charlie Hu, Samuel P....
GECCO
2004
Springer
105views Optimization» more  GECCO 2004»
15 years 5 months ago
Evolution-Based Deliberative Planning for Cooperating Unmanned Ground Vehicles in a Dynamic Environment
Many challenges remain in the development of tactical planning systems that will enable automated, cooperative replanning of routes and mission assignments for multiple unmanned gr...
Talib S. Hussain, David J. Montana, Gordon Vidaver
GECCO
2008
Springer
148views Optimization» more  GECCO 2008»
15 years 28 days ago
Using quotient graphs to model neutrality in evolutionary search
We introduce quotient graphs for modeling neutrality in evolutionary search. We demonstrate that for a variety of evolutionary computing problems, search can be characterized by g...
Dominic Wilson, Devinder Kaur
DAC
2003
ACM
16 years 25 days ago
Making cyclic circuits acyclic
Cyclic circuits that do not hold state or oscillate are often the most convenient representation for certain functions, such as arbiters, and can easily be produced inadvertently ...
Stephen A. Edwards
ACSAC
2003
IEEE
15 years 5 months ago
Intrusion Detection: A Bioinformatics Approach
This paper addresses the problem of detecting masquerading, a security attack in which an intruder assumes the identity of a legitimate user. Many approaches based on Hidden Marko...
Scott E. Coull, Joel W. Branch, Boleslaw K. Szyman...