Sciweavers

1272 search results - page 132 / 255
» Implementation of Bitmap Based Incognito and Performance Eva...
Sort
View
GECCO
2010
Springer
187views Optimization» more  GECCO 2010»
14 years 18 days ago
Evolving agent behavior in multiobjective domains using fitness-based shaping
Multiobjective evolutionary algorithms have long been applied to engineering problems. Lately they have also been used to evolve behaviors for intelligent agents. In such applicat...
Jacob Schrum, Risto Miikkulainen
SIMUTOOLS
2008
13 years 10 months ago
PlanetSim: an extensible framework for overlay network and services simulations
Research community on distributed systems, and in particular on peer-to-peer systems, needs tools for evaluating their own protocols and services, as well as against other protoco...
Jordi Pujol Ahulló, Pedro García L&o...
WSC
1997
13 years 10 months ago
On the Effect and Control of Self-Similar Network Traffic: A Simulation Perspective
This paper presents a discussion of simulation-related issues arising in the study of self-similar network traffic with respect to its effect and control. Selfsimilar traffic has...
Kihong Park
CSL
2010
Springer
13 years 9 months ago
Speech segmentation using regression fusion of boundary predictions
In the present work we study the appropriateness of a number of linear and non-linear regression methods, employed on the task of speech segmentation, for combining multiple phone...
Iosif Mporas, Todor Ganchev, Nikos Fakotakis
IJNSEC
2008
117views more  IJNSEC 2008»
13 years 9 months ago
Wavelet-based Real Time Detection of Network Traffic Anomalies
Real time network monitoring for intrusions is offered by various host and network based intrusion detection systems. These systems largely use signature or pattern matching techni...
Chin-Tser Huang, Sachin Thareja, Yong-June Shin