Sciweavers

6010 search results - page 1070 / 1202
» Computational Approaches to Drug Design
Sort
View
NETWORK
2008
94views more  NETWORK 2008»
13 years 9 months ago
Detecting compromised routers via packet forwarding behavior
While it is widely understood that criminal miscreants are subverting large numbers of Internet-connected computers (e.g., for bots, spyware, SPAM forwarding), it is less well app...
Alper Tugay Mizrak, Stefan Savage, Keith Marzullo
SWARM
2008
SPRINGER
222views Optimization» more  SWARM 2008»
13 years 9 months ago
Biologically inspired redistribution of a swarm of robots among multiple sites
We present a biologically inspired approach to the dynamic assignment and reassignment of a homogeneous swarm of robots to multiple locations, which is relevant to applications lik...
M. Ani Hsieh, Ádám M. Halász,...
IJSNET
2007
95views more  IJSNET 2007»
13 years 9 months ago
On extracting consistent graphs in wireless sensor networks
: Robustness and security of services like localisation, routing and time synchronisation in Wireless Sensor Networks (WSNs) have been critical issues. Efficient mathematical (gra...
Murtuza Jadliwala, Qi Duan, Jinhui Xu, Shambhu J. ...
IPM
2007
156views more  IPM 2007»
13 years 9 months ago
Integration of an XML electronic dictionary with linguistic tools for natural language processing
This study proposes the codification of lexical information in electronic dictionaries, in accordance with a generic and extendable XML scheme model, and its conjunction with lin...
Octavio Santana Suárez, Francisco J. Carrer...
TEC
2008
100views more  TEC 2008»
13 years 9 months ago
Real-Valued Compact Genetic Algorithms for Embedded Microcontroller Optimization
Recent research on compact genetic algorithms (cGAs) has proposed a number of evolutionary search methods with reduced memory requirements. In cGAs, the evolution of populations is...
Ernesto Mininno, Francesco Cupertino, David Naso
« Prev « First page 1070 / 1202 Last » Next »