Sciweavers

216 search results - page 23 / 44
» A new evolutionary model for detecting multiple optima
Sort
View
CORR
2010
Springer
158views Education» more  CORR 2010»
14 years 12 months ago
Dynamic Multi Layer Signature based Intrusion Detection system Using Mobile Agents
Intrusion detection systems have become a key component in ensuring the safety of systems and networks. As networks grow in size and speed continues to increase, it is crucial tha...
Mueen Uddin, Azizah Abdul Rahman
GECCO
2009
Springer
254views Optimization» more  GECCO 2009»
15 years 6 months ago
Agglomerative genetic algorithm for clustering in social networks
Size and complexity of data repositories collaboratively created by Web users generate a need for new processing approaches. In this paper, we study the problem of detection of ï¬...
Marek Lipczak, Evangelos E. Milios
85
Voted
ICPR
2010
IEEE
14 years 9 months ago
Online Learning with Self-Organizing Maps for Anomaly Detection in Crowd Scenes
Detecting abnormal behaviors in crowd scenes is quite important for public security and has been paid more and more attentions. Most previous methods use offline trained model to p...
Jie Feng, Chao Zhang, Pengwei Hao
ICST
2010
IEEE
14 years 10 months ago
Precisely Detecting Runtime Change Interactions for Evolving Software
Abstract—Developers often make multiple changes to software. These changes are introduced to work cooperatively or to accomplish separate goals. However, changes might not intera...
Raúl A. Santelices, Mary Jean Harrold, Ales...
104
Voted
BROADNETS
2007
IEEE
15 years 6 months ago
Resource dimensioning in WDM networks under state-based routing schemes
— Network dimensioning for wavelength-routed WDM networks has been extensively studied to maximize connection acceptance rate while minimizing the total cost. However, Internet s...
Xiaolan J. Zhang, Sun-il Kim, Steven S. Lumetta