Sciweavers

1066 search results - page 123 / 214
» Applying Architectural Hybridization in Networked Embedded S...
Sort
View
147
Voted
GECCO
2004
Springer
121views Optimization» more  GECCO 2004»
15 years 10 months ago
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the des...
Gerry V. Dozier, Douglas Brown, John Hurley, Kryst...
ICANN
2003
Springer
15 years 9 months ago
The Acquisition of New Categories through Grounded Symbols: An Extended Connectionist Model
Abstract. Solutions to the symbol grounding problem, in psychologically plausible cognitive models, have been based on hybrid connectionist/symbolic architectures, on robotic appro...
Alberto Greco, Thomas Riga, Angelo Cangelosi
LISA
2001
15 years 6 months ago
The CoralReef Software Suite as a Tool for System and Network Administrators
Until now, system administrators have lacked a flexible real-time network traffic flow monitoring package. Such a package must provide a wide range of services but remain flexible ...
David Moore, Ken Keys, Ryan Koga, Edouard Lagache,...
137
Voted
ISSS
1997
IEEE
103views Hardware» more  ISSS 1997»
15 years 8 months ago
Fast and Extensive System-Level Memory Exploration for ATM Applications
In this paper, our memory architecture exploration methodology and CAD techniques for network protocol applications are presented. Prototype tools have been implemented, and appli...
Peter Slock, Sven Wuytack, Francky Catthoor, Gjalt...
PDSE
1998
103views more  PDSE 1998»
15 years 5 months ago
Towards a Framework for Testing Distributed Multimedia Software Systems
With the advancement in network speed and computing power; distributed multimedia applications are becoming populal: However;generalprinciples of system testing cannot be directly...
Jelena V. Misic, Samuel T. Chanson, Shing-Chi Cheu...