Sciweavers

1512 search results - page 104 / 303
» When Suboptimal Rules
Sort
View
COMSWARE
2007
IEEE
15 years 5 months ago
On Optimal Performance in Mobile Ad hoc Networks
In this paper we are concerned with finding the maximum throughput that a mobile ad hoc network can support. Even when nodes are stationary, the problem of determining the capaci...
Tapas K. Patra, Joy Kuri, Pavan Nuggehalli
GECCO
2005
Springer
163views Optimization» more  GECCO 2005»
15 years 4 months ago
An artificial immune system algorithm for CDMA multiuser detection over multi-path channels
Based on the Antibody Clonal Selection Theory of immunology, we put forward a novel clonal selection algorithm for multiuser detection in Code-division Multiple-access Systems. By...
Maoguo Gong, Ling Wang, Licheng Jiao, Haifeng Du
VLSISP
2008
104views more  VLSISP 2008»
14 years 11 months ago
Guidance of Loop Ordering for Reduced Memory Usage in Signal Processing Applications
Data dominated signal processing applications are typically described using large and multi-dimensional arrays and loop nests. The order of production and consumption of array ele...
Per Gunnar Kjeldsberg, Francky Catthoor, Sven Verd...
ISDA
2010
IEEE
14 years 9 months ago
Avoiding simplification strategies by introducing multi-objectiveness in real world problems
Abstract--In business analysis, models are sometimes oversimplified. We pragmatically approach many problems with a single financial objective and include monetary values for non-m...
Charlotte J. C. Rietveld, Gijs P. Hendrix, Frank T...
GAMESEC
2011
344views Game Theory» more  GAMESEC 2011»
13 years 10 months ago
Aegis A Novel Cyber-Insurance Model
Recent works on Internet risk management have proposed the idea of cyber-insurance to eliminate risks due to security threats, which cannot be tackled through traditional means suc...
Ranjan Pal, Leana Golubchik, Konstantinos Psounis