Sciweavers

531 search results - page 19 / 107
» A strategy for selecting multiple components
Sort
View
CN
1999
115views more  CN 1999»
14 years 11 months ago
A large scale distributed intrusion detection framework based on attack strategy analysis
To appropriately address the problem of large-scale distributed intrusion assessment/detection, issues such as information exchange, work division and coordination amongst various...
Ming-Yuh Huang, Robert J. Jasper, Thomas M. Wicks
GECCO
2008
Springer
118views Optimization» more  GECCO 2008»
15 years 23 days ago
An analysis of multi-sampled issue and no-replacement tournament selection
Standard tournament selection samples individuals with replacement. The sampling-with-replacement strategy has its advantages but also has issues. One of the commonly recognised i...
Huayang Xie, Mengjie Zhang, Peter Andreae, Mark Jo...
ICIP
2007
IEEE
15 years 6 months ago
Detection Strategies for Image Cube Trajectory Analysis
Image Cube Trajectory (ICT) analysis is a new and robust method to estimate the 3D structure of a scene from a set of 2D images. For a moving camera each 3D point is represented b...
Ingo Feldmann, Peter Kauff, Peter Eisert
CN
2006
107views more  CN 2006»
14 years 11 months ago
Sub-graph routing: A generalized fault-tolerant strategy for link failures in WDM optical networks
Single- and multiple-link failure resilience are of critical importance in survivable wavelength division multiplexed (WDM) optical network design. Networks are not made up simply...
Michael T. Frederick, Pallab Datta, Arun K. Somani
IDA
2009
Springer
15 years 6 months ago
Cumulative State Coherence Transform for a Robust Two-Channel Multiple Source Localization
This work presents a novel robust method for a two-channel multiple Time Difference of Arrival (TDOA) estimation. The method is based on a recursive frequency-domain Independent C...
Francesco Nesta, Piergiorgio Svaizer, Maurizio Omo...