Sciweavers

533 search results - page 71 / 107
» The Computational Complexity of Sensitivity Analysis and Par...
Sort
View
TEC
2002
133views more  TEC 2002»
13 years 7 months ago
Learning and optimization using the clonal selection principle
The clonal selection principle is used to explain the basic features of an adaptive immune response to an antigenic stimulus. It establishes the idea that only those cells that rec...
Leandro Nunes de Castro, Fernando J. Von Zuben
DSN
2007
IEEE
13 years 11 months ago
Performability Models for Multi-Server Systems with High-Variance Repair Durations
We consider cluster systems with multiple nodes where each server is prone to run tasks at a degraded level of service due to some software or hardware fault. The cluster serves t...
Hans-Peter Schwefel, Imad Antonios
ACSAC
2010
IEEE
13 years 5 months ago
Kells: a protection framework for portable data
Portable storage devices, such as key-chain USB devices, are ubiquitous. These devices are often used with impunity, with users repeatedly using the same storage device in open co...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...
IJNSEC
2011
272views more  IJNSEC 2011»
13 years 2 months ago
Trust Key Management Scheme for Wireless Body Area Networks
With recent advances in wireless sensor networks and embedded computing technologies, miniaturized pervasive health monitoring devices have become practically feasible. In additio...
Mohammed Mana, Mohammed Feham, Boucif Amar Bensabe...
UAI
2008
13 years 9 months ago
Inference for Multiplicative Models
The paper introduces a generalization for known probabilistic models such as log-linear and graphical models, called here multiplicative models. These models, that express probabi...
Ydo Wexler, Christopher Meek