This site uses cookies to deliver our services and to ensure you get the best experience. By continuing to use this site, you consent to our use of cookies and acknowledge that you have read and understand our Privacy Policy, Cookie Policy, and Terms
In this paper, we develop a security design metric that can be used at system design time to build more secure systems. This metric is based on the system-wide approach and adopt a...
Charlie Y. Shim, Jung Y. Kim, Sung Y. Shin, Jiman ...
In this paper, an intelligent power management scheme for embedded systems with wireless applications is proposed to reduce the power consumption of the overall system. The propose...
Incremental checkpointing is an cost-efficient fault tolerant technique for long running programs such as genetic algorithms. In this paper, we derive the equations for the writing...
Abstract. In this paper, we propose a novel classification algorithm, called geometrical probability covering (GPC) algorithm, to improve classification ability. On the basis of ...
Abstract. We introduce a property of set to represent vagueness without using truth value. It has gotten less attention in fuzzy set theory. We introduce it by analyzing a well-kno...
Abstract. In the artificial neural networks (ANNs), feature selection is a wellresearched problem, which can improve the network performance and speed up the training of the networ...