Sciweavers

1734 search results - page 46 / 347
» What works
Sort
View
GECCO
2005
Springer
183views Optimization» more  GECCO 2005»
14 years 1 months ago
802.11 network intrusion detection using genetic programming
Genetic Programming (GP) based Intrusion Detection Systems (IDS) use connection state network data during their training phase. These connection states are recorded as a set of fe...
Patrick LaRoche, A. Nur Zincir-Heywood

Publication
490views
15 years 6 months ago
Performance Testing Effort at the ATM Forum: An Overview
The testing group at ATM Forum is working on developing a specification for performance testing of ATM switches and networks. The emphasis is on the user perceived frame-level perf...
Raj Jain and Gojko Babic
ACII
2007
Springer
14 years 2 months ago
Sound for A-Life Agents
in the form of light clusters (displayed in arrays of LEDs) and abstract electroacoustic sound — what we term low-fidelity embodiments. Thus, the architecture for such agents is...
Melanie Baljko, John Kamevaar, Nell Tenhaaf
CAISE
2008
Springer
13 years 10 months ago
Validation of UML Conceptual Schemas with Operations
The purpose of validating a conceptual schema is to check whether it specifies what the designer intended. Our approach to validation consists in translating the schema into logic ...
Anna Queralt, Ernest Teniente
APAL
2006
91views more  APAL 2006»
13 years 8 months ago
Computing interpolants in implicational logics
I present a new syntactical method for proving the Interpolation Theorem for the implicational fragment of intuitionistic logic and its substructural subsystems. This method, like...
Makoto Kanazawa