Sciweavers

7891 search results - page 1349 / 1579
» Local Area Networking
Sort
View
123
Voted
GECCO
2007
Springer
177views Optimization» more  GECCO 2007»
15 years 8 months ago
Evolving virtual creatures revisited
Thirteen years have passed since Karl Sims published his work on evolving virtual creatures. Since then, several novel approaches to neural network evolution and genetic algorithm...
Peter Krcah
104
Voted
HUC
2007
Springer
15 years 8 months ago
Privacy Enhancing Technologies for RFID in Retail- An Empirical Investigation
This article investigates the conflicting area of user benefits arising through item level RFID tagging and a desire for privacy. It distinguishes between three approaches feasible...
Sarah Spiekermann
ISVC
2007
Springer
15 years 8 months ago
A Scalable Aural-Visual Environment for Security Event Monitoring, Analysis, and Response
Abstract. Intrusion detection systems gather large quantities of host and network information in an attempt to detect and respond to attacks against an organization. The widely var...
Paul Z. Kolano
105
Voted
WADS
2007
Springer
89views Algorithms» more  WADS 2007»
15 years 8 months ago
Dynamic TCP Acknowledgment with Sliding Window
The dynamic TCP acknowledgement problem formulated by Dooly et al. has been intensively studied in the area of competitive analysis. However, their framework does not consider the ...
Hisashi Koga
133
Voted
AICCSA
2006
IEEE
133views Hardware» more  AICCSA 2006»
15 years 8 months ago
Learning acyclic rules based on Chaining Genetic Programming
Multi-class problem is the class of problems having more than one classes in the data set. Bayesian Network (BN) is a well-known algorithm handling the multi-class problem and is ...
Wing-Ho Shum, Kwong-Sak Leung, Man Leung Wong
« Prev « First page 1349 / 1579 Last » Next »