Sciweavers

143 search results - page 16 / 29
» Revisiting Negative Selection Algorithms
Sort
View
IAW
2003
IEEE
14 years 24 days ago
An Evolutionary Approach to Generate Fuzzy Anomaly Signatures
Abstract— This paper describes the generation of fuzzy signatures to detect some cyber attacks. This approach is an enhancement to our previous work, which was based on the princ...
Fabio A. González, Jonatan Gómez, Ma...
FSR
2003
Springer
112views Robotics» more  FSR 2003»
14 years 21 days ago
Decentralised SLAM with Low-Bandwidth Communication for Teams of Vehicles
— This paper addresses the problem of simultaneous localization and mapping (SLAM) for teams of collaborating vehicles where the communication bandwidth is limited. We present a ...
Eric Nettleton, Sebastian Thrun, Hugh F. Durrant-W...
GECCO
2008
Springer
128views Optimization» more  GECCO 2008»
13 years 8 months ago
Discriminating self from non-self with finite mixtures of multivariate Bernoulli distributions
Affinity functions are the core components in negative selection to discriminate self from non-self. It has been shown that affinity functions such as the r-contiguous distance an...
Thomas Stibor
IJCNN
2007
IEEE
14 years 1 months ago
Two-stage Multi-class AdaBoost for Facial Expression Recognition
— Although AdaBoost has achieved great success, it still suffers from following problems: (1) the training process could be unmanageable when the number of features is extremely ...
Hongbo Deng, Jianke Zhu, Michael R. Lyu, Irwin Kin...
ICC
2000
IEEE
123views Communications» more  ICC 2000»
13 years 12 months ago
A Per-Flow Based Node Architecture for Integrated Services Packet Networks
As the Internet transforms from the traditional best-effort service network into QoS-capable multi-service network, it is essential to have new architectural design and appropriate...
Dapeng Wu, Yiwei Thomas Hou, Takeo Hamada, Zhi-Li ...