Sciweavers

3876 search results - page 678 / 776
» Dynamic Adaptive Pre-Tenuring
Sort
View
SWAP
2007
13 years 11 months ago
Applying Semantic Web Services
The use of Semantic Web Services (SWS) for increasing agility and adaptability in process execution is currently investigated in many settings. The common underlying idea is the dy...
Stefania Galizia, Alessio Gugliotta, Carlos Pedrin...
ATAL
2010
Springer
13 years 11 months ago
Collaborative foraging using beacons
A classic example of multiagent coordination in a shared environment involves the use of pheromone deposits as a communication mechanism. Due to physical limitations in deploying ...
Brian Hrolenok, Sean Luke, Keith Sullivan, Christo...
GECCO
2008
Springer
127views Optimization» more  GECCO 2008»
13 years 11 months ago
Denial of service detection and analysis using idiotypic networks paradigm
In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDS), that aims at dealing with large scale network attacks featuring variab...
Marek Ostaszewski, Pascal Bouvry, Franciszek Sered...
GECCO
2008
Springer
134views Optimization» more  GECCO 2008»
13 years 11 months ago
Branch predictor on-line evolutionary system
In this work a branch prediction system which utilizes evolutionary techniques is introduced. It allows the predictor to adapt to the executed code and thus to improve its perform...
Karel Slany
GECCO
2008
Springer
196views Optimization» more  GECCO 2008»
13 years 11 months ago
A fuzzy-genetic approach to network intrusion detection
Computer networks have expanded significantly in use and numbers. This expansion makes them more vulnerable to attack by malicious agents. Many current intrusion detection systems...
Terrence P. Fries