Sciweavers

1646 search results - page 274 / 330
» A genetic algorithm for designing distributed computer netwo...
Sort
View
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
14 years 3 months ago
IMAD: in-execution malware analysis and detection
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore...
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Fa...
HPCN
1999
Springer
14 years 1 months ago
GeoFEM: High Performance Parallel FEM for Solid Earth
hima and I. Fujishiro, "Measuring volumetric coherence," In ACM SIGGRAPH98 Conference Abstracts and Applications, p.260, July 1998. 1999 K.Garatani, H.Nakamura, H.Okuda a...
Kazuteru Garatani, Hisashi Nakamura, Hiroshi Okuda...
MOBIWAC
2009
ACM
14 years 3 months ago
The sociable traveller: human travelling patterns in social-based mobility
Understanding how humans move is a key factor for the design and evaluation of networking protocols and mobility management solutions in mobile networks. This is particularly true...
Chiara Boldrini, Marco Conti, Andrea Passarella
KDD
2012
ACM
197views Data Mining» more  KDD 2012»
11 years 11 months ago
On the separability of structural classes of communities
Three major factors govern the intricacies of community extraction in networks: (1) the application domain includes a wide variety of networks of fundamentally different natures,...
Bruno D. Abrahao, Sucheta Soundarajan, John E. Hop...
DSN
2007
IEEE
14 years 25 days ago
Automatic Verification and Discovery of Byzantine Consensus Protocols
Model-checking of asynchronous distributed protocols is challenging because of the large size of the state and solution spaces. This paper tackles this problem in the context of l...
Piotr Zielinski