Sciweavers

35 search results - page 7 / 7
» Immune programming
Sort
View
LCN
2006
IEEE
14 years 2 days ago
Protecting Multicast Sessions in Wireless Mesh Networks
To support reliable multicast routing in wireless mesh networks, it is important to protect multicast sessions against link or node failures. The issue of protecting multicast ses...
Xin Zhao, Chun Tung Chou, Jun Guo, Sanjay Jha
ACSAC
2004
IEEE
13 years 9 months ago
Using Predators to Combat Worms and Viruses: A Simulation-Based Study
Large-scale attacks generated by fast-spreading or stealthy malicious mobile code, such as flash worms and e-mail viruses, demand new approaches to patch management and disinfecti...
Ajay K. Gupta 0002, Daniel C. DuVarney
BMCBI
2010
161views more  BMCBI 2010»
13 years 6 months ago
GeneMesh: a web-based microarray analysis tool for relating differentially expressed genes to MeSH terms
Background: An important objective of DNA microarray-based gene expression experimentation is determining interrelationships that exist between differentially expressed genes and ...
Saurin D. Jani, Gary L. Argraves, Jeremy L. Barth,...
CVIU
2011
12 years 9 months ago
Graph-based quadratic optimization: A fast evolutionary approach
Quadratic optimization lies at the very heart of many structural pattern recognition and computer vision problems, such as graph matching, object recognition, image segmentation, ...
Samuel Rota Bulò, Marcello Pelillo, Immanue...
SOSP
2007
ACM
14 years 2 months ago
Attested append-only memory: making adversaries stick to their word
Researchers have made great strides in improving the fault tolerance of both centralized and replicated systems against arbitrary (Byzantine) faults. However, there are hard limit...
Byung-Gon Chun, Petros Maniatis, Scott Shenker, Jo...