Sciweavers

CORR
2008
Springer
112views Education» more  CORR 2008»
13 years 4 months ago
Investigating Artificial Immune Systems For Job Shop Rescheduling In Changing Environments
Artificial immune system can be used to generate schedules in changing environments and it has been proven to be more robust than schedules developed using a genetic algorithm. Go...
Uwe Aickelin, Edmund K. Burke, Aniza Mohamed Din
CORR
2008
Springer
118views Education» more  CORR 2008»
13 years 4 months ago
On Affinity Measures for Artificial Immune System Movie Recommenders
We combine Artificial Immune Systems (AIS) technology with Collaborative Filtering (CF) and use it to build a movie recommendation system. We already know that Artificial Immune Sy...
Uwe Aickelin, Qi Chen
CORR
2008
Springer
111views Education» more  CORR 2008»
13 years 4 months ago
Computational Models of Spreadsheet Development: Basis for Educational Approaches
Among the multiple causes of high error rates in spreadsheets, lack of proper training and of deep understanding of the computational model upon which spreadsheet computations res...
Karin Hodnigg, Markus Clermont, Roland T. Mitterme...
CORR
2008
Springer
116views Education» more  CORR 2008»
13 years 4 months ago
A statistical mechanical interpretation of algorithmic information theory
Abstract. We develop a statistical mechanical interpretation of algorithmic information theory by introducing the notion of thermodynamic quantities, such as free energy, energy, s...
Kohtaro Tadaki
CORR
2008
Springer
118views Education» more  CORR 2008»
13 years 4 months ago
Strategic Alert Throttling for Intrusion Detection Systems
: Network intrusion detection systems are themselves becoming targets of attackers. Alert flood attacks may be used to conceal malicious activity by hiding it among a deluge of fa...
Gianni Tedesco, Uwe Aickelin
CORR
2008
Springer
143views Education» more  CORR 2008»
13 years 4 months ago
On Reliability of Dynamic Addressing Routing Protocols in Mobile Ad Hoc Networks
In this paper, a reliability analysis is carried out to state a performance comparison between two recently proposed proactive routing algorithms. These protocols are able to scale...
Marcello Caleffi, Giancarlo Ferraiuolo, Luigi Paur...
CORR
2008
Springer
124views Education» more  CORR 2008»
13 years 4 months ago
High Performance Cooperative Transmission Protocols Based on Multiuser Detection and Network Coding
Abstract--Cooperative transmission is an emerging communication technique that takes advantage of the broadcast nature of wireless channels. However, due to low spectral efficiency...
Zhu Han, Xin Zhang, H. Vincent Poor
CORR
2008
Springer
98views Education» more  CORR 2008»
13 years 4 months ago
Spanners of Additively Weighted Point Sets
Prosenjit Bose, Paz Carmi, Mathieu Couture
CORR
2008
Springer
135views Education» more  CORR 2008»
13 years 4 months ago
Crossing Borders: Security and Privacy Issues of the European e-Passport
The first generation of European e-passports will be issued in 2006. We discuss how borders are crossed regarding the security and privacy erosion of the proposed schemes, and show...
Jaap-Henk Hoepman, Engelbert Hubbers, Bart Jacobs,...