Learn More
Anonymity technologies have gained more and more attention for communication privacy. In general, users obtain anonymity at a certain cost in an anonymous communication system, which uses rerouting to increase the system's robustness. However, a long rerouting path incurs large overhead and decreases the quality of service (QoS). In this paper, we propose(More)
Keywords: Single machine scheduling Sequence-dependent setup times Hybrid evolutionary algorithm Crossover operator Population updating a b s t r a c t We present a systematic comparison of hybrid evolutionary algorithms (HEAs), which independently use six combinations of three crossover operators and two population updating strategies, for solving the(More)
(2013). Automatic BDI plan recognition from process execution logs and effect logs. Abstract Agent applications are often viewed as unduly expensive to develop and maintain in commercial contexts. Organizations often settle for less sophisticated and more traditional software in place of agent technology because of (often misplaced) fears about the(More)