Sciweavers

1207 search results - page 67 / 242
» Towards optimal k-anonymization
Sort
View
79
Voted
GECCO
2008
Springer
144views Optimization» more  GECCO 2008»
15 years 1 months ago
Multiobjective robustness for portfolio optimization in volatile environments
Multiobjective methods are ideal for evolving a set of portfolio optimisation solutions that span a range from highreturn/high-risk to low-return/low-risk, and an investor can cho...
Ghada Hassan, Christopher D. Clack
JUCS
2007
186views more  JUCS 2007»
15 years 19 days ago
An Hybrid Fuzzy Variable Neighborhood Particle Swarm Optimization Algorithm for Solving Quadratic Assignment Problems
: Recently, Particle Swarm Optimization (PSO) algorithm has exhibited good performance across a wide range of application problems. A quick review of the literature reveals that re...
Hongbo Liu, Ajith Abraham
95
Voted
CEC
2007
IEEE
15 years 7 months ago
A fractal representation for real optimization
— The chaos game, in which a moving point is repeatedly averaged toward randomly selected vertices of a triangle, is one method of generating the fractal called the Sierpinski tr...
Daniel A. Ashlock, Justin Schonfeld
ICMCS
2005
IEEE
113views Multimedia» more  ICMCS 2005»
15 years 6 months ago
Goal based optimal selection of media streams
A multimedia system utilizes a set of correlated media streams each of which partially help in achieving the system goal. However, since not all of the streams always contribute t...
Pradeep K. Atrey, Mohan S. Kankanhalli
PRDC
2005
IEEE
15 years 6 months ago
Optimal Choice of Checkpointing Interval for High Availability
Supporting high availability by checkpointing and switching to a backup upon failure of a primary has a cost. Trade-off studies help system architects to decide whether higher ava...
Diana Szentiványi, Simin Nadjm-Tehrani, Joh...