Abstract. In this paper, we consider a two-layer hierarchy, ı.e. micro and umbrella layer, cellular system, and propose a new hand-off mechanism to minimize call blocking probabil...
Abstract. An evolutionary algorithm is used to evolve a digital circuit which computes a simple hash function mapping a 16-bit address space into an 8-bit one. The target technolog...
Ernesto Damiani, Valentino Liberali, Andrea Tettam...
In this paper, we leverage the concepts of formal grammar and genetic operators to evolve malware. As a case study, we take COM infectors and design their formal grammar with produ...
Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Mu...
This work describes how evolutionary computation can be used to synthesize lowlevel image operators that detect interesting points on digital images. Interest point detection is a...
Today, most multi-connected autonomous systems (AS) need to control the flow of their interdomain traffic for both performance and economical reasons. This is usually done by manu...