Sciweavers

252 search results - page 36 / 51
» A Scenario-Based Approach to Protocol Design Using Evolution...
Sort
View
120
Voted
CSREASAM
2010
15 years 5 days ago
Modeling NIDS Evasion with Genetic Programming
Nowadays, Network Intrusion Detection Systems are quickly updated in order to prevent systems against new attacks. This situation has provoked that attackers focus their efforts on...
Sergio Pastrana, Agustín Orfila, Arturo Rib...
122
Voted
SRDS
2007
IEEE
15 years 9 months ago
Customizable Fault Tolerance for Wide-Area Replication
Constructing logical machines out of collections of physical machines is a well-known technique for improving the robustness and fault tolerance of distributed systems. We present...
Yair Amir, Brian A. Coan, Jonathan Kirsch, John La...
168
Voted
PEWASUN
2008
ACM
15 years 4 months ago
Communication models for throughput optimization in mesh networks
There has been extensive research focused on maximizing the throughput of wireless networks in general and mesh networks in particular. Recently, techniques have been developed th...
Stephan Bohacek, Peng Wang
191
Voted
AI
1998
Springer
15 years 7 months ago
A Hybrid Genetic Algorithm for the Vehicle Routing Problem with Time Windows
A variety of hybrid genetic algorithms has been recently proposed to address the vehicle routing problem with time windows (VRPTW), a problem known to be NP-hard. However, very few...
Jean Berger, Martin Salois, Regent Begin
TITS
2002
103views more  TITS 2002»
15 years 3 months ago
Artificial vision in extreme environments for snowcat tracks detection
This paper describes the image processing techniques designed to localize the tracks of snowcats for the automation of transportation of goods and people during the Italian scienti...
Alberto Broggi, Alessandra Fascioli