Computational Science and Its Applications: ICCSA ..., International Conference : Proceedings, 3. daļaSpringer, 2003 |
No grāmatas satura
1.–3. rezultāts no 20.
581. lappuse
... algorithm for the RSTP is the reduction rate that is achieved by the difference between the objective value of the RSTP and that of ... Evolutionary Algorithms for the Rectilinear Steiner Tree Problem Using Fitness Estimation Byounghak Yang.
... algorithm for the RSTP is the reduction rate that is achieved by the difference between the objective value of the RSTP and that of ... Evolutionary Algorithms for the Rectilinear Steiner Tree Problem Using Fitness Estimation Byounghak Yang.
582. lappuse
... genetic algorithm . But , reduction rate of genetic algorithms were worse than the other heuristics . Sock and Ahn [ 15 ] used genetic algorithm to solve the degree constrained minimum spanning tree . Yang [ 19 ] introduced an evolutionary ...
... genetic algorithm . But , reduction rate of genetic algorithms were worse than the other heuristics . Sock and Ahn [ 15 ] used genetic algorithm to solve the degree constrained minimum spanning tree . Yang [ 19 ] introduced an evolutionary ...
589. lappuse
... Evolutionary Algorithm in Theory and Practice , Oxford University Press ( 1996 ) 2. Barreiros , Jorge , An Hierarchic Genetic Algorithm for Computing ( near ) Optimal Euclidean Stein Steiner Trees . Workshop on Application of hybrid ...
... Evolutionary Algorithm in Theory and Practice , Oxford University Press ( 1996 ) 2. Barreiros , Jorge , An Hierarchic Genetic Algorithm for Computing ( near ) Optimal Euclidean Stein Steiner Trees . Workshop on Application of hybrid ...
Saturs
A Security Requirement Management Database Based on ISOIEC | 1 |
CTOBIBased Pitch Accent Prediction Using MaximumEntropy | 21 |
PGNIDSPatternGraph Based Network Intrusion Detection System | 38 |
Autortiesības | |
73 citas sadaļas nav parādītas.
Citi izdevumi - Skatīt visu
Bieži izmantoti vārdi un frāzes
adversary algorithm analysis AODV applied architecture attack authentication Berlin Heidelberg 2006 blind signatures block block cipher buffer cipher cluster head collision resistant component Computer constraints cost defined detection efficient encryption evaluation fuzzy Gavrilova Genetic Algorithm hash function heuristic ICCSA IEEE implementation input integrated inventory IP address IPv4 IPv6 keystream Korea layer linear LNCS machine method minimize mobile module neural network node NP-hard objective ontology operation optimal solution output packet paper parameter password pattern performance pitch accent problem production proposed protocol provably secure public key random Research RFID router routing Section selected sensor sequence server setup signature scheme simulation skip lists solve Springer-Verlag Berlin Heidelberg Step stream cipher subnet Table tabu search technique Theorem traffic variables vector weight wireless