Sciweavers

5234 search results - page 1031 / 1047
» Simulation of Computer Network Attacks
Sort
View
TSMC
2010
13 years 4 months ago
Cellular Learning Automata With Multiple Learning Automata in Each Cell and Its Applications
The cellular learning automaton (CLA), which is a4 combination of cellular automaton (CA) and learning automaton5 (LA), is introduced recently. This model is superior to CA because...
Hamid Beigy, Mohammad Reza Meybodi
INFOCOM
2007
IEEE
14 years 4 months ago
Lexicographic Fairness in WDM Optical Cross-Connects
— We consider fair allocation of sessions at the outputs of optical cross-connects employing wavelength division multiplexing (WDM). Each session consists of traffic on one or m...
Satya Ranjan Mohanty, Laxmi N. Bhuyan
AIHC
2007
Springer
14 years 4 months ago
Modeling Naturalistic Affective States Via Facial, Vocal, and Bodily Expressions Recognition
Affective and human-centered computing have attracted a lot of attention during the past years, mainly due to the abundance of devices and environments able to exploit multimodal i...
Kostas Karpouzis, George Caridakis, Loïc Kess...
GECCO
2007
Springer
159views Optimization» more  GECCO 2007»
14 years 4 months ago
Evolutionary hypernetwork models for aptamer-based cardiovascular disease diagnosis
We present a biology-inspired probabilistic graphical model, called the hypernetwork model, and its application to medical diagnosis of disease. The hypernetwork models are a way ...
JungWoo Ha, Jae-Hong Eom, Sung-Chun Kim, Byoung-Ta...
ICS
2000
Tsinghua U.
14 years 1 months ago
A simulation-based study of scheduling mechanisms for a dynamic cluster environment
Scheduling of processes onto processors of a parallel machine has always been an important and challenging area of research. The issue becomes even more crucial and di cult as we ...
Yanyong Zhang, Anand Sivasubramaniam, José ...
« Prev « First page 1031 / 1047 Last » Next »