Sciweavers

6907 search results - page 1252 / 1382
» Securing distributed adaptation
Sort
View
ATAL
2010
Springer
14 years 11 months ago
Reasoning about strategies of multi-agent programs
Verification of multi-agent programs is a key problem in agent research and development. This paper focuses on multi-agent programs that consist of a finite set of BDI-based agent...
Mehdi Dastani, Wojciech Jamroga
ATAL
2010
Springer
14 years 11 months ago
UAV swarm coordination using cooperative control for establishing a wireless communications backbone
In this paper, we present a mechanism to fly a swarm of UAVs with the aim of establishing a wireless backbone over a pre-specified area. The backbone is aimed at connecting interm...
Achudhan Sivakumar, Colin Keng-Yan Tan
BPM
2009
Springer
143views Business» more  BPM 2009»
14 years 11 months ago
MDPE Workbench - A Solution for Performance Related Decision Support
Abstract. Continuous optimization of business process execution including its adaptation to changes within the market environment or the company itself becomes increasingly importa...
Mathias Fritzsche, Jendrik Johannes, Sebastian Cec...
CEC
2010
IEEE
14 years 11 months ago
A novel memetic algorithm for constrained optimization
In this paper, we present a memetic algorithm with novel local optimizer hybridization strategy for constrained optimization. The developed MA consists of multiple cycles. In each ...
Jianyong Sun, Jonathan M. Garibaldi
CIDR
2009
132views Algorithms» more  CIDR 2009»
14 years 11 months ago
uFLIP: Understanding Flash IO Patterns
Does the advent of flash devices constitute a radical change for secondary storage? How should database systems adapt to this new form of secondary storage? Before we can answer t...
Luc Bouganim, Björn Þór Jó...
« Prev « First page 1252 / 1382 Last » Next »