Sciweavers

3335 search results - page 551 / 667
» A Unified Approach to Modeling and Programming
Sort
View
IJISEC
2008
119views more  IJISEC 2008»
15 years 4 months ago
Estimating the maximum information leakage
Preventing improper information leaks is a greatest challenge of the modern society. In this paper we present a technique for measuring the ability of several families of adversari...
Alessandro Aldini, Alessandra Di Pierro
IJSNET
2008
125views more  IJSNET 2008»
15 years 4 months ago
Minimum-cost sensor arrangement for achieving wanted coverage lifetime
: Suppose we need to watch a set of targets continuously for a required period of time, and suppose we choose any number of sensors from a fixed set of sensor types and place them ...
Jie Wang, Ning Zhong
ISCI
2006
96views more  ISCI 2006»
15 years 4 months ago
A comparison of classification accuracy of four genetic programming-evolved intelligent structures
We investigate the effectiveness of GP-generated intelligent structures in classification tasks. Specifically, we present and use four context-free grammars to describe (1) decisi...
Athanasios Tsakonas
JASIS
2006
108views more  JASIS 2006»
15 years 4 months ago
Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems
P2P applications are rapidly gaining acceptance among users of Internet-based services, especially because of their capability of exchanging resources while preserving the anonymi...
Roberto Aringhieri, Ernesto Damiani, Sabrina De Ca...
ENGL
2007
136views more  ENGL 2007»
15 years 4 months ago
Multilayered Evolutionary Architecture for Behaviour Arbitration in Cognitive Agents
— In this work, an hybrid, self-configurable, multilayered and evolutionary subsumption architecture for cognitive agents is developed. Each layer of the multilayered architectur...
Oscar Javier Romero López