Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS

Linked e-resources

Details

Intro; Preface; Contents; Evaluation of the Succession Measures of the Simultaneous Perturbation Stochastic Approximation Algorithm for the Optimization of the Process Capability Index; 1 Introduction; 2 Materials and Methods; 2.1 SPSA Algorithm and Optimization of the PCI (Cpk ); 3 Results; 4 Conclusions; References; An Optimization Vehicle Routing Problem Approached by Bio-inspired Algorithms-A Real Case Study; 1 Introduction; 2 Background; 2.1 Vehicle Routing Problem; 2.2 Bio-Inspired Algorithms; 2.3 Overview of Related Works; 3 Proposed Method and Problem Description

4 Simulation Results5 Conclusions; Appendix; References; Agent-Based Model of Resistant Bacterial Evolution in an Heterogeneous Medium; 1 Introduction; 1.1 Antibiotic Resistance Development; 1.2 Heterogeneous Environments; 1.3 Development of Antibiotic Resistance at the Molecular Level; 1.4 Agent-Based Modeling; 2 Methodology; 3 Results; 3.1 Simulations; 3.2 Statistical Analysis; 4 Discussions; 5 Conclusions; References; Towards Intelligent Systems for Ubiquitous Computing: Tacit Knowledge-Inspired Ubicomp; 1 Introduction; 2 Ubiquitous Computing; 2.1 Ubicomp Characteristics

2.2 Ubicomp Paradigms3 Context-Awareness; 3.1 The Components of Context-Aware Systems; 3.2 Related Work; 4 Tacit Knowledge in Context Awareness; 4.1 Knowledge; 4.2 Tacit Knowledge Elements; 4.3 Tacit Knowledge Creation Process; 4.4 Proposal; 4.5 Tacit Context Modeling; 5 Conclusions; 5.1 Future Work; References; Applied Decision Making in Design Innovation Management; 1 Introduction; 2 The Decision-Making Process; 3 Defining Innovation; 4 New Product Development, Management and Design; 5 Case Study: Information Technology Firms in Baja California; 6 Conclusions; References

From Simulation to Implementation: Practical Advice for Policy Makers Who Want to Use Computer Modeling as an Analysis and Communication Tool1 Introduction; 1.1 The Challenges of Public Policy Design; 2 Complexity and Emergence; 2.1 Complexity and Public Policies; 2.2 Complexity and Cities; 3 Modeling; 3.1 Computational Modeling; 3.2 Agent-Based Models; 4 Recommendations for Beginning Modelers; 4.1 The Modeling Process; 4.2 Real World Observation; 4.3 Theory Elaboration; 4.4 Model Execution; 4.5 Output Analysis and Representation; 4.6 Results Presentation; References

Adaptive Security Based on MAPE-K: A Survey1 Introduction; 2 Background; 2.1 Autonomic Computing; 2.2 MAPE-K Reference Model; 2.3 Adaptive Security; 3 Survey of Adaptive Security Systems; 3.1 Adaptive Authorization Framework, Bailey et al.; 3.2 Adaptive Security in Smart Space, Evesti et al.; 3.3 Adaptive Access Control Model, Ma and Wang; 3.4 Dynamic Reconfiguration of Security Policies, Pinto et al.; 3.5 Adaptive Security Solution, Amoud and Roudies; 3.6 Adaptive Security in Mobile Devices, Amoud and Roudies; 3.7 Adaptive Security in Smart Camera Networks, Amoud and Roudies

Browse Subjects

Show more subjects...

Statistics

from
to
Export