Sciweavers

4998 search results - page 858 / 1000
» The case for intentional networking
Sort
View
ICANN
2005
Springer
14 years 2 months ago
Evolution of Heuristics for Give-Away Checkers
The efficacy of two evolutionary approaches to the problem of generation of heuristical linear and non-linear evaluation functions in the game of give-away checkers is tested in th...
Magdalena Kusiak, Karol Waledzik, Jacek Mandziuk
IPMI
2005
Springer
14 years 2 months ago
Automated Detection of Small-Size Pulmonary Nodules Based on Helical CT Images
Abstract. A computer-aided diagnosis (CAD) system to detect smallsize (from 2 mm to around 10 mm) pulmonary nodules in helical CT scans is developed. This system uses different sc...
Xiangwei Zhang, Geoffrey McLennan, Eric A. Hoffman...
NOSSDAV
2005
Springer
14 years 2 months ago
Natural selection in peer-to-peer streaming: from the cathedral to the bazaar
Success of peer-to-peer applications in many cases is attributed to user altruism, where a user contributes some of its own resources to facilitate performance of other users. Thi...
Vivek Shrivastava, Suman Banerjee
WAC
2005
Springer
118views Communications» more  WAC 2005»
14 years 2 months ago
Experiments on the Automatic Evolution of Protocols Using Genetic Programming
Truly autonomic networks ultimately require self-modifying, evolving protocol software. Otherwise humans must intervene in every situation that has not been anticipated at design t...
Lidia Yamamoto, Christian F. Tschudin
WEA
2005
Springer
109views Algorithms» more  WEA 2005»
14 years 2 months ago
Synchronization Fault Cryptanalysis for Breaking A5/1
Abstract. A5/1 pseudo-random bit generator, known from GSM networks, potentially might be used for different purposes, such as secret hiding during cryptographic hardware testing, ...
Marcin Gomulkiewicz, Miroslaw Kutylowski, Heinrich...