Sciweavers

621 search results - page 76 / 125
» Identifying the (Tele)Presence Literature
Sort
View
CCS
2004
ACM
14 years 3 months ago
Operational experiences with high-volume network intrusion detection
In large-scale environments, network intrusion detection systems (NIDSs) face extreme challenges with respect to traffic volume, traffic diversity, and resource management. Whil...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
GECCO
2004
Springer
14 years 3 months ago
On Multi-class Classification by Way of Niching
In recent literature, the niche enabling effects of crowding and the sharing algorithms have been systematically investigated in the context of Genetic Algorithms and are now estab...
Andrew R. McIntyre, Malcolm I. Heywood
GECCO
2004
Springer
132views Optimization» more  GECCO 2004»
14 years 3 months ago
Optimizing Topology and Parameters of Gene Regulatory Network Models from Time-Series Experiments
Abstract. In this paper we address the problem of finding gene regulatory networks from experimental DNA microarray data. Different approaches to infer the dependencies of gene r...
Christian Spieth, Felix Streichert, Nora Speer, An...
GECCO
2004
Springer
116views Optimization» more  GECCO 2004»
14 years 3 months ago
A Comment on Opt-AiNET: An Immune Network Algorithm for Optimisation
Verifying the published results of algorithms is part of the usual research process. This helps to both validate the existing literature, but also quite often allows for new insigh...
Jon Timmis, Camilla Edmonds
ISW
2004
Springer
14 years 3 months ago
A Model for the Semantics of Attack Signatures in Misuse Detection Systems
Misuse Detection systems identify evidence of attacks by searching for patterns of known attacks (signatures). A main problem in this context is the modeling and specification of a...
Michael Meier