Sciweavers

104 search results - page 19 / 21
» Graph Searching, Elimination Trees, and a Generalization of ...
Sort
View
GECCO
2007
Springer
129views Optimization» more  GECCO 2007»
14 years 4 days ago
Procreating V-detectors for nonself recognition: an application to anomaly detection in power systems
The artificial immune system approach for self-nonself discrimination and its application to anomaly detection problems in engineering is showing great promise. A seminal contribu...
Min Gui, Sanjoy Das, Anil Pahwa
GECCO
2007
Springer
180views Optimization» more  GECCO 2007»
14 years 4 days ago
Towards the coevolution of cellular automata controllers for chemical computing with the B-Z reaction
We propose that the behaviour of non-linear media can be controlled automatically through coevolutionary systems. By extension, forms of unconventional computing, i.e., massively ...
Christopher Stone, Rita Toth, Andrew Adamatzky, Be...
IWCMC
2006
ACM
13 years 12 months ago
Modeling key agreement in multi-hop ad hoc networks
Securing multicast communications in ad hoc networks has become one of the most challenging research directions in the areas of wireless networking and security. This is especiall...
Giovanni Di Crescenzo, Maria Striki, John S. Baras
KDD
2006
ACM
174views Data Mining» more  KDD 2006»
14 years 6 months ago
Onboard classifiers for science event detection on a remote sensing spacecraft
Typically, data collected by a spacecraft is downlinked to Earth and pre-processed before any analysis is performed. We have developed classifiers that can be used onboard a space...
Ashley Davies, Benjamin Cichy, Dominic Mazzoni, Ng...
WWW
2011
ACM
13 years 27 days ago
Growing parallel paths for entity-page discovery
In this paper, we use the structural and relational information on the Web to find entity-pages. Specifically, given a Web site and an entity-page (e.g., department and faculty ...
Tim Weninger, Fabio Fumarola, Cindy Xide Lin, Rick...