Sciweavers

3082 search results - page 549 / 617
» New Bounds for the Controller Problem
Sort
View
SP
2010
IEEE
140views Security Privacy» more  SP 2010»
15 years 8 months ago
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries
Abstract—Unfortunately, malicious software is still an unsolved problem and a major threat on the Internet. An important component in the fight against malicious software is the...
Clemens Kolbitsch, Thorsten Holz, Christopher Krue...
ATAL
2006
Springer
15 years 7 months ago
Exploring sensor networks using mobile agents
Today's wireless sensor networks have limited flexibility because their software is static. Mobile agents alleviate this problem by introducing mobile code and state. Mobile ...
Daniel Massaguer, Chien-Liang Fok, Nalini Venkatas...
EURONGI
2006
Springer
15 years 7 months ago
Joint Connection and Packet Level Analysis in W-CDMA Radio Interface
Abstract. This work introduces a new analytical method for performance evaluation of wireless packet-oriented networks. Unlike traditional call admission control procedures commonl...
Vilius Benetis, Larissa Popova, Villy Bæk Iv...
GECCO
2006
Springer
147views Optimization» more  GECCO 2006»
15 years 7 months ago
Deceptiveness and neutrality the ND family of fitness landscapes
When a considerable number of mutations have no effects on fitness values, the fitness landscape is said neutral. In order to study the interplay between neutrality, which exists ...
William Beaudoin, Sébastien Vérel, P...
122
Voted
GECCO
2006
Springer
128views Optimization» more  GECCO 2006»
15 years 7 months ago
FTXI: fault tolerance XCS in integer
In the realm of data mining, several key issues exists in the traditional classification algorithms, such as low readability, large rule number, and low accuracy with information ...
Hong-Wei Chen, Ying-Ping Chen