Sciweavers

1886 search results - page 322 / 378
» Verifying and validating a simulation model
Sort
View
ISCC
2005
IEEE
132views Communications» more  ISCC 2005»
15 years 3 months ago
A Reputation-Based Trust Mechanism for Ad Hoc Networks
— The main characterisrics of ad hoc networks are the lack of predefined infrastructure and the dynamic topology. These characteristics present some new security vulnerabilities...
Yacine Rebahi, Vicente E. Mujica V, Dorgham Sisale...
GECCO
2005
Springer
132views Optimization» more  GECCO 2005»
15 years 3 months ago
Takeover time curves in random and small-world structured populations
We present discrete stochastic mathematical models for the growth curves of synchronous and asynchronous evolutionary algorithms with populations structured according to a random ...
Mario Giacobini, Marco Tomassini, Andrea Tettamanz...
ACMICEC
2004
ACM
161views ECommerce» more  ACMICEC 2004»
15 years 3 months ago
The 2003 Supply Chain Management Trading Agent Competition
Supply Chain Management deals with the planning and coordination of bidding, production and procurement activities across the multiple organizations involved in the delivery of on...
Raghu Arunachalam, Norman M. Sadeh
CSB
2003
IEEE
15 years 3 months ago
Haplotype Motifs: An Algorithmic Approach to Locating Evolutionarily Conserved Patterns in Haploid Sequences
The promise of plentiful data on common human genetic variations has given hope that we will be able to uncover genetic factors behind common diseases that have proven difficult ...
Russell Schwartz
INFOCOM
2003
IEEE
15 years 3 months ago
Understanding CHOKe
— A recently proposed active queue management, CHOKe, is stateless, simple to implement, yet surprisingly effective in protecting TCP from UDP flows. As UDP rate increases, even...
Ao Tang, Jiantao Wang, Steven H. Low