Sciweavers

1806 search results - page 328 / 362
» Some Functions Computable with a Fused-Mac
Sort
View
GECCO
2007
Springer
149views Optimization» more  GECCO 2007»
14 years 2 months ago
Dendritic cells for SYN scan detection
Artificial immune systems have previously been applied to the problem of intrusion detection. The aim of this research is to develop an intrusion detection system based on the fu...
Julie Greensmith, Uwe Aickelin
GECCO
2007
Springer
183views Optimization» more  GECCO 2007»
14 years 2 months ago
Self-adaptive simulated binary crossover for real-parameter optimization
Simulated binary crossover (SBX) is a real-parameter recombination operator which is commonly used in the evolutionary algorithm (EA) literature. The operator involves a parameter...
Kalyanmoy Deb, Karthik Sindhya, Tatsuya Okabe
ICCS
2007
Springer
14 years 2 months ago
Creating Individual Based Models of the Plankton Ecosystem
Abstract. The Virtual Ecology Workbench (VEW) is a suite of utilities for creating, executing and analysing biological models of the ocean. At its core is a mathematical language a...
Wes Hinsley, Tony Field, John Woods
DATE
2006
IEEE
100views Hardware» more  DATE 2006»
14 years 2 months ago
Simulation and analysis of network on chip architectures: ring, spidergon and 2D mesh
NoC architectures can be adopted to support general communications among multiple IPs over multi-processor Systems on Chip (SoCs). In this work we illustrate the modeling and simu...
Luciano Bononi, Nicola Concer
ICMCS
2006
IEEE
116views Multimedia» more  ICMCS 2006»
14 years 2 months ago
SIKAS: A Scalable Distributed Key Management Scheme for Dynamic Collaborative Groups
The increasing popularity of distributed and collaborative applications prompts the need for secure communication in collaborative groups. Some distributed collaborative key manag...
Jiang Zhang, Jian-Guang Luo, Bin Li, Shiqiang Yang