Sciweavers

146 search results - page 16 / 30
» Two-layered face detection system using evolutionary algorit...
Sort
View
ISAAC
2009
Springer
142views Algorithms» more  ISAAC 2009»
14 years 2 months ago
Of Choices, Failures and Asynchrony: The Many Faces of Set Agreement
Abstract. Set agreement is a fundamental problem in distributed computing in which processes collectively choose a small subset of values from a larger set of proposals. The imposs...
Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Core...
GECCO
2005
Springer
132views Optimization» more  GECCO 2005»
14 years 1 months ago
Evolving computer intrusion scripts for vulnerability assessment and log analysis
Evolutionary computation is used to construct undetectable computer attack scripts. Using a simulated operating system, we show that scripts can be evolved to cover their tracks a...
Julien Budynek, Eric Bonabeau, Ben Shargel
CCS
2007
ACM
14 years 1 months ago
Optimal security hardening using multi-objective optimization on attack tree models of networks
Researchers have previously looked into the problem of determining if a given set of security hardening measures can effectively make a networked system secure. Many of them also...
Rinku Dewri, Nayot Poolsappasit, Indrajit Ray, Dar...
GPEM
2007
119views more  GPEM 2007»
13 years 7 months ago
Genomic mining for complex disease traits with "random chemistry"
Our rapidly growing knowledge regarding genetic variation in the human genome offers great potential for understanding the genetic etiology of disease. This, in turn, could revolut...
Margaret J. Eppstein, Joshua L. Payne, Bill C. Whi...
WACV
2002
IEEE
14 years 17 days ago
A Real-time Precrash Vehicle Detection System
— This paper presents an in-vehicle real-time monocular precrash vehicle detection system. The system acquires grey level images through a forward facing low light camera and ach...
Zehang Sun, Ronald Miller, George Bebis, David DiM...