Sciweavers

13987 search results - page 137 / 2798
» The Two Guards Problem
Sort
View
139
Voted
IJISEC
2008
92views more  IJISEC 2008»
15 years 3 months ago
A coding approach to the multicast stream authentication problem
We study the multicast stream authentication problem when an opponent can drop, reorder and introduce data packets into the communication channel. In such a model, packet overhead...
Christophe Tartary, Huaxiong Wang, Josef Pieprzyk
141
Voted
NETWORKS
2007
15 years 3 months ago
Models and branch-and-cut algorithms for pickup and delivery problems with time windows
In the pickup and delivery problem with time windows (PDPTW), capacitated vehicles must be routed to satisfy a set of transportation requests between given origins and destination...
Stefan Ropke, Jean-François Cordeau, Gilber...
148
Voted
ICTAI
2009
IEEE
15 years 1 months ago
A Confidence-Based Dominance Operator in Evolutionary Algorithms for Noisy Multiobjective Optimization Problems
This paper describes a noise-aware dominance operator for evolutionary algorithms to solve the multiobjective optimization problems (MOPs) that contain noise in their objective fu...
Pruet Boonma, Junichi Suzuki
CADE
2008
Springer
16 years 3 months ago
The Logical Difference Problem for Description Logic Terminologies
Abstract. We consider the problem of computing the logical difference between distinct versions of description logic terminologies. For the lightweight description logic EL, we pre...
Boris Konev, Dirk Walther, Frank Wolter
GECCO
2007
Springer
166views Optimization» more  GECCO 2007»
15 years 9 months ago
Comparison of tree and graph encodings as function of problem complexity
In this paper, we analyze two general-purpose encoding types, trees and graphs systematically, focusing on trends over increasingly complex problems. Tree and graph encodings are ...
Michael D. Schmidt, Hod Lipson