Sciweavers

2929 search results - page 549 / 586
» Evolving evolutionary algorithms using evolutionary algorith...
Sort
View
CISIM
2008
IEEE
14 years 2 months ago
Evolution Induced Secondary Immunity: An Artificial Immune System Based Intrusion Detection System
The analogy between Immune Systems and Intrusion Detection Systems encourage the use of Artificial Immune Systems for anomaly detection in computer networks. This paper describes ...
Divyata Dal, Siby Abraham, Ajith Abraham, Sugata S...
SCALESPACE
1999
Springer
14 years 5 days ago
Fast Marching to Moving Object Location
In this paper we address two important problems in motion analysis: the detection of moving objects and their localization. Statistical and level set approaches are adopted in orde...
Eftychios Sifakis, George Tziritas
CONEXT
2007
ACM
13 years 12 months ago
Rethinking internet traffic management: from multiple decompositions to a practical protocol
In the Internet today, traffic management spans congestion control (at end hosts), routing protocols (on routers), and traffic engineering (by network operators). Historically, th...
Jiayue He, Martin Suchara, Ma'ayan Bresler, Jennif...
SIGCOMM
2010
ACM
13 years 8 months ago
EyePhone: activating mobile phones with your eyes
As smartphones evolve researchers are studying new techniques to ease the human-mobile interaction. We propose EyePhone, a novel "hand-free" interfacing system capable o...
Emiliano Miluzzo, Tianyu Wang, Andrew T. Campbell
BMCBI
2006
87views more  BMCBI 2006»
13 years 8 months ago
Phylogeny based discovery of regulatory elements
Background: Algorithms that locate evolutionarily conserved sequences have become powerful tools for finding functional DNA elements, including transcription factor binding sites;...
Jason Gertz, Justin C. Fay, Barak A. Cohen