Sciweavers

250 search results - page 14 / 50
» gecco 2008
Sort
View
GECCO
2008
Springer
127views Optimization» more  GECCO 2008»
13 years 11 months ago
Denial of service detection and analysis using idiotypic networks paradigm
In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDS), that aims at dealing with large scale network attacks featuring variab...
Marek Ostaszewski, Pascal Bouvry, Franciszek Sered...
GECCO
2008
Springer
229views Optimization» more  GECCO 2008»
13 years 11 months ago
EIN-WUM: an AIS-based algorithm for web usage mining
With the ever expanding Web and the information published on it, effective tools for managing such data and presenting information to users based on their needs are becoming nece...
Adel Torkaman Rahmani, B. Hoda Helmi
GECCO
2008
Springer
143views Optimization» more  GECCO 2008»
13 years 11 months ago
Collective intelligence and bush fire spotting
Bush fires cause major damage each year in many areas of the world and the earlier that they can be detected the easier it is to minimize this damage. This paper describes a coll...
David Howden, Tim Hendtlass
GECCO
2008
Springer
157views Optimization» more  GECCO 2008»
13 years 11 months ago
Self-adaptive mutation rates in genetic algorithm for inverse design of cellular automata
Self-adaptation is used a lot in Evolutionary Strategies and with great success, yet for some reason it is not the mutation adaptation of choice for Genetic Algorithms. This poste...
Ron Breukelaar, Thomas Bäck
GECCO
2008
Springer
128views Optimization» more  GECCO 2008»
13 years 11 months ago
Discriminating self from non-self with finite mixtures of multivariate Bernoulli distributions
Affinity functions are the core components in negative selection to discriminate self from non-self. It has been shown that affinity functions such as the r-contiguous distance an...
Thomas Stibor