Sciweavers

4307 search results - page 771 / 862
» Dynamic Spyware Analysis
Sort
View
TEC
2008
149views more  TEC 2008»
13 years 8 months ago
Biogeography-Based Optimization
Abstract--We propose a novel variation to biogeographybased optimization (BBO), which is an evolutionary algorithm (EA) developed for global optimization. The new algorithm employs...
Dan Simon
TFS
2008
123views more  TFS 2008»
13 years 8 months ago
Numerical and Linguistic Prediction of Time Series With the Use of Fuzzy Cognitive Maps
Abstract--In this paper, we introduce a novel approach to timeseries prediction realized both at the linguistic and numerical level. It exploits fuzzy cognitive maps (FCMs) along w...
Wojciech Stach, Lukasz A. Kurgan, Witold Pedrycz
TIFS
2008
208views more  TIFS 2008»
13 years 8 months ago
A Network Coding Approach to Secret Key Distribution
We consider the problem of secret key distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network. Our main...
Paulo F. Oliveira, João Barros
TIFS
2008
142views more  TIFS 2008»
13 years 8 months ago
An FPGA-Based Network Intrusion Detection Architecture
Abstract--Network intrusion detection systems (NIDSs) monitor network traffic for suspicious activity and alert the system or network administrator. With the onset of gigabit netwo...
Abhishek Das, David Nguyen, Joseph Zambreno, Gokha...
TIP
2008
208views more  TIP 2008»
13 years 8 months ago
Vision Processing for Realtime 3-D Data Acquisition Based on Coded Structured Light
Structured light vision systems have been successfully used for accurate measurement of 3-D surfaces in computer vision. However, their applications are mainly limited to scanning ...
S. Y. Chen, Y. F. Li, Jianwei Zhang