Sciweavers

8647 search results - page 1493 / 1730
» The Container Selection Problem
Sort
View
115
Voted
FSKD
2008
Springer
128views Fuzzy Logic» more  FSKD 2008»
15 years 4 months ago
Applying Fuzzy PROMETHEE Method for Evaluating IS Outsourcing Suppliers
The demand for outsourcing in the information systems (IS) field has become a part of basic corporate strategy and has experienced a considerable growth in recent years. The proce...
Tien-Chin Wang, L. Y. Chen, Ying-Hsiu Chen
131
Voted
GECCO
2008
Springer
137views Optimization» more  GECCO 2008»
15 years 4 months ago
Evolutionary path planner for UAVs in realistic environments
This paper presents a path planner for Unmanned Air Vehicles (UAVs) based on Evolutionary Algorithms (EA) that can be used in realistic risky scenarios. The path returned by the a...
Jesús Manuel de la Cruz, Eva Besada-Portas,...
120
Voted
GECCO
2008
Springer
117views Optimization» more  GECCO 2008»
15 years 4 months ago
Non-monotone differential evolution
The Differential Evolution algorithm uses an elitist selection, constantly pushing the population in a strict downhill search, in an attempt to guarantee the conservation of the ...
Michael G. Epitropakis, Vassilis P. Plagianakos, M...
112
Voted
ICML
2010
IEEE
15 years 4 months ago
Active Learning for Multi-Task Adaptive Filtering
In this paper, we propose an Active Learning (AL) framework for the Multi-Task Adaptive Filtering (MTAF) problem. Specifically, we explore AL approaches to rapidly improve an MTAF...
Abhay Harpale, Yiming Yang
129
Voted
SIGCOMM
2010
ACM
15 years 3 months ago
NetShield: massive semantics-based vulnerability signature matching for high-speed networks
Accuracy and speed are the two most important metrics for Network Intrusion Detection/Prevention Systems (NIDS/NIPSes). Due to emerging polymorphic attacks and the fact that in ma...
Zhichun Li, Gao Xia, Hongyu Gao, Yi Tang, Yan Chen...
« Prev « First page 1493 / 1730 Last » Next »