An orthogonal hill-climbing algorithm for dynamic optimization problems with continuous variables (labeled ODHC ) is proposed in present paper. The local peak climber is not a solution x, but rather a "niche"...
详细信息
An orthogonal hill-climbing algorithm for dynamic optimization problems with continuous variables (labeled ODHC ) is proposed in present paper. The local peak climber is not a solution x, but rather a "niche", a small hyperrectangle. An orthogonal design method is employed on the niches for the niche to climb a potentially peak fast. An archive is used to store the latest found higher peaks for the ODHC algorithm learning from the past search. The randomly creating niches implement the global search. Numerical experiments show that the ODHC algorithm performs a lot better than the SOS (self organizing scouts) algorithm [J. Branke, T. Kaufler, C. Schmidt, and H. Schmeck. A multipopulation approach to dynamic optimization problems. Adaptive Computing in Design and Manufacturing. Springer, 2000.].
This article introduces a special issue of software Process - Improvement and Practice focusing on processes found in free or open source software development (F/OSSD) projects. It seeks to provide a background overvi...
详细信息
There are rather few articles in the literature so far that deal with dynamic multi-objective optimization problems. This article introduces a dynamic orthogonal multi-objective evolutionary algorithm called "DOM...
详细信息
There are rather few articles in the literature so far that deal with dynamic multi-objective optimization problems. This article introduces a dynamic orthogonal multi-objective evolutionary algorithm called "DOMOEA", that generalizes an earlier paper of ours (on an orthogonal multi-objective evolutionary algorithm (OMOEA-II) (Zeng et al., 2005)) to dynamic environments. DOMOEA solves a particular class of dynamic multi-objective optimization problems, namely those that have continuous decision variables. This new algorithm uses the evolutionary results, before any environmental change, as the initial population after the environmental change. It applies an "orthogonal design method" to enhance the fitness of the population during the static stages between two successive changes of environment. We obtained satisfactory results when testing this algorithm against the benchmark problems proposed in the literature. Our new algorithm is based on an ordinary evolutionary algorithm that does not have the capacity to detect environmental changes. Hence it has a comparatively simple structure, making comparisons with other dynamic multi-objective evolutionary algorithms relatively easy.
This paper formally defines a role-driven security and access control model of a business process in order eventually to provide a theoretical basis for realizing the secured business process management systems. That ...
详细信息
This paper formally defines a role-driven security and access control model of a business process in order eventually to provide a theoretical basis for realizing the secured business process management systems. That is, we propose a graphical representation and formal description of the mechanism that generates a set of role-driven security and access control models from a business process modeled by the information control net (ICN) modeling methodology that is a typical business process modeling approach for defining and specifying business processes. Based upon the mechanism, we are able to design and accomplish a secured business process management system that provides an unified resource access control mechanism of the business process management engine domains and the application domains. Finally, we strongly believe that the secured access control policies from the role-driven security and access control model can be easily transformed into the RBAC (role-based access control) model that is a standardized security technology for computer and communications systems of commercial and civilian government organizations
This paper proposes an adaptive routing protocol called ARFA for an integrated cellular and ad hoc heterogeneous network with flexible access (iCAR-FA). An iCAR-FA system offers a flexible traffic diversion mechanism ...
详细信息
This paper proposes an adaptive routing protocol called ARFA for an integrated cellular and ad hoc heterogeneous network with flexible access (iCAR-FA). An iCAR-FA system offers a flexible traffic diversion mechanism that allows a mobile host to utilize the bandwidth in another cell, as such easing the congestion problem and increasing the throughput in a cellular network. Based on the presentation of the iCAR-FA physical characteristics, the paper details the design issues and operation of ARFA. Detailed numerical analysis on routing overhead, which is along with some general evaluations, has indicated the effectiveness and efficiency of the ARFA protocol
This panel presents the results of the ITiCSE 2005 working group on facilitating student learning through study abroad and international projects. It discusses ways of adding international experiences to student learn...
详细信息
ISBN:
(纸本)9781920682347
This panel presents the results of the ITiCSE 2005 working group on facilitating student learning through study abroad and international projects. It discusses ways of adding international experiences to student learning, barriers to international learning, and how to do more. Dialogue with the attendees will broaden the discussion.
Recent years have seen a large number of proposals for anonymity mechanisms operating on the application layer. Given that anonymity is no stronger than its weakest link, such proposals are only meaningful if one can ...
详细信息
Recent years have seen a large number of proposals for anonymity mechanisms operating on the application layer. Given that anonymity is no stronger than its weakest link, such proposals are only meaningful if one can offer anonymity guarantees on the communication layer as well. ANODR - or anonymous on demand routing - is one of the leading proposals to deal with this issue. In this paper, we propose a novel technique to address the same problem, but at a lower cost. Our proposal, which we dub discount-ANODR, is built around the same set of techniques as ANODR is. Our proposal has the benefit of achieving substantially lower computation and communication complexities at the cost of a slight reduction of privacy guarantees. In particular, discount-ANODR achieves source anonymity and routing privacy. A route is "blindly generated" by the intermediaries on the path between an anonymous source and an identified destination. Route requests in discount-ANODR bear strong similarities to route requests in existing source routing protocols, with the limitation that intermediaries only know the destination of the request and the identity of the previous intermediary - but not whether the latter was the originator of the request. The response to a route request protects the compiled route by means of iterated symmetric encryption, drawing on how messages are prepared before being submitted to a typical synchronous mix network (or onion router). The communication of data subsequently uses such "route onions" to channel the packet to the intended destination. We do not use any key exchange, nor do we utilize public key operations at any time; consequently, we do not need to rely on any PKI, CRL or related constructions
When different agents communicate with each other, there needs to be some way to ensure that the meaning of what one agent embodies is accurately conveyed to another agent. It has been argued that ontologies play a ke...
详细信息
In this paper, circuit design of an arithmetic module applied to cryptography - modulo multiplicative inverse is presented and implemented using FPGA hardware technology. This modular arithmetic function contains iter...
详细信息
In this paper, circuit design of an arithmetic module applied to cryptography - modulo multiplicative inverse is presented and implemented using FPGA hardware technology. This modular arithmetic function contains iterative computations of division, multiplication and accumulation with variable loop times. Besides standard HDL programming and schematic input, Simulink-to-FPGA has been tried as a different design flow. Experimental results are compared between different design methods with discussion of their pros and cons
暂无评论