Sciweavers

2269 search results - page 415 / 454
» Behavioral Intrusion Detection
Sort
View
GRAPHICSINTERFACE
2000
13 years 11 months ago
Adaptive Representation of Specular Light Flux
Caustics produce beautiful and intriguing illumination patterns. However, their complex behavior make them difficult to simulate accurately in all but the simplest configurations....
Normand Brière, Pierre Poulin
CEC
2010
IEEE
13 years 11 months ago
An analysis of clustering objectives for feature selection applied to encrypted traffic identification
This work explores the use of clustering objectives in a Multi-Objective Genetic Algorithm (MOGA) for both, feature selection and cluster count optimization, under the application...
Carlos Bacquet, A. Nur Zincir-Heywood, Malcolm I. ...
SAC
2010
ACM
13 years 10 months ago
Chemotaxis-based sorting of self-organizing heterotypic agents
Cell sorting is a fundamental phenomenon in morphogenesis, which is the process that leads to shape formation in living organisms. The sorting of heterotypic cell populations is p...
Manolya Eyiyurekli, Linge Bai, Peter I. Lelkes, Da...
AAMAS
2008
Springer
13 years 10 months ago
Anticipation based on constraint processing in a multi-agent context
Anticipation is a general concept used and applied in various domains. Many studies in the field of artificial intelligence have investigated the capacity for anticipation. In thi...
Arnaud Doniec, René Mandiau, Sylvain Piecho...
CORR
2008
Springer
106views Education» more  CORR 2008»
13 years 10 months ago
Infinity-Norm Sphere-Decoding
Abstract--Promising approaches for efficient detection in multiple-input multiple-output (MIMO) wireless systems are based on sphere-decoding (SD). The conventional (and optimum) n...
Dominik Seethaler, Helmut Bölcskei