Sciweavers

292 search results - page 46 / 59
» Dormant program nodes and the efficiency of genetic programm...
Sort
View
CORR
2004
Springer
146views Education» more  CORR 2004»
13 years 7 months ago
ANTIDS: Self-Organized Ant-based Clustering Model for Intrusion Detection System
: Security of computers and the networks that connect them is increasingly becoming of great significance. Computer security is defined as the protection of computing systems again...
Vitorino Ramos, Ajith Abraham
WAIM
2010
Springer
13 years 6 months ago
Mining Contrast Inequalities in Numeric Dataset
Finding relational expressions which exist frequently in one class of data while not in the other class of data is an interesting work. In this paper, a relational expression of th...
Lei Duan, Jie Zuo, Tianqing Zhang, Jing Peng, Jie ...
ICC
2008
IEEE
159views Communications» more  ICC 2008»
14 years 2 months ago
Link Scheduling and Power Control in Wireless Mesh Networks with Directional Antennas
— Directional antennas are very attractive in Wireless Mesh Networks (WMN). We study the problem of link scheduling and power control in a Time-Division Multiple Access (TDMA) WM...
Vishwanath Ramamurthi, Abu Ahmed Reaz, Sudhir S. D...
ICCAD
2001
IEEE
152views Hardware» more  ICCAD 2001»
14 years 4 months ago
Hybrid Structured Clock Network Construction
This paper hierarchically constructs a hybrid mesh/tree clock network structure consisting of overlying zero-skew clock meshes, with underlying zero-skew clock trees originating f...
Haihua Su, Sachin S. Sapatnekar
ICC
2008
IEEE
121views Communications» more  ICC 2008»
14 years 2 months ago
Maximization of Network Survival Time in the Event of Intelligent and Malicious Attacks
—It is not possible to ensure that a network is absolutely secure. Therefore, network operators must continually change their defense strategies to counter attackers who constant...
Po-Hao Tsang, Frank Yeong-Sung Lin, Chun-Wei Chen