Sciweavers

666 search results - page 34 / 134
» When Similar Problems Don't Have Similar Solutions
Sort
View
ICC
2007
IEEE
110views Communications» more  ICC 2007»
14 years 3 months ago
Distributed Early Worm Detection Based on Payload Histograms
— Epidemic worms has become a social problem owing to their potency in paralyzing the Internet, thus affecting our way of life. Recent researches have pointed out that epidemic w...
Yuji Waizumi, Masashi Tsuji, Hiroshi Tsunoda, Nirw...
EMMCVPR
2001
Springer
14 years 1 months ago
A Double-Loop Algorithm to Minimize the Bethe Free Energy
Recent work (Yedidia, Freeman, Weiss [22]) has shown that stable points of belief propagation (BP) algorithms [12] for graphs with loops correspond to extrema of the Bethe free ene...
Alan L. Yuille
GECCO
2006
Springer
135views Optimization» more  GECCO 2006»
14 years 16 days ago
Single and multi-objective genetic operators in object-oriented conceptual software design
This poster paper investigates the potential of single and multiobjective genetic operators with an object-oriented conceptual design space. Using cohesion as an objective fitness...
Christopher L. Simons, Ian C. Parmee
ICCD
2004
IEEE
97views Hardware» more  ICCD 2004»
14 years 5 months ago
A General Post-Processing Approach to Leakage Current Reduction in SRAM-Based FPGAs
A negative effect of ever-shrinking supply and threshold voltages is the larger percentage of total power consumption that comes from leakage current. Several techniques have been...
John Lach, Jason Brandon, Kevin Skadron
PERCOM
2008
ACM
14 years 8 months ago
A Novel Utility and Game-Theoretic Based Security Mechanism for Mobile P2P Systems
Research on security in Peer-to-Peer (P2P) systems is dominated by reputation-based solutions. These solutions propagate opinions about other peers in order to help identify the b...
Brent Lagesse, Mohan Kumar