Sciweavers

2214 search results - page 304 / 443
» Initial Design of the
Sort
View
ESORICS
2007
Springer
14 years 3 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
EUROPAR
2007
Springer
14 years 3 months ago
Surrendering Autonomy: Can Cooperative Mobility Help?
In this paper, we develop a Cooperative Mobility Model that captures new salient features of collaborative and mission-oriented MANETs. In particular, the cost-benefit framework o...
Ghassen Ben Brahim, Bilal Khan, Ala I. Al-Fuqaha, ...
GECCO
2007
Springer
177views Optimization» more  GECCO 2007»
14 years 3 months ago
On the behavioral diversity of random programs
Generating a random sampling of program trees with specified function and terminal sets is the initial step of many program evolution systems. I present a theoretical and experim...
Moshe Looks
GECCO
2007
Springer
154views Optimization» more  GECCO 2007»
14 years 3 months ago
A novel ab-initio genetic-based approach for protein folding prediction
In this paper, a model based on genetic algorithms for protein folding prediction is proposed. The most important features of the proposed approach are: i) Heuristic secondary str...
Sergio Raul Duarte Torres, David Camilo Becerra Ro...
ICCS
2007
Springer
14 years 3 months ago
A Combined Hardware/Software Optimization Framework for Signal Representation and Recognition
This paper describes a signal recognition system that is jointly optimized from mathematical representation, algorithm design and final implementation. The goal is to exploit sign...
Melina Demertzi, Pedro C. Diniz, Mary W. Hall, Ann...