Sciweavers

71228 search results - page 199 / 14246
» Algorithms
Sort
View
CORR
2010
Springer
124views Education» more  CORR 2010»
15 years 1 months ago
Detecting Danger: The Dendritic Cell Algorithm
l invaders in the form of pathogens. In this research, and abstract model of DC behaviour is developed and subsequently used to form an algorithm, the DCA. The abstraction process ...
Julie Greensmith, Uwe Aickelin, Steve Cayzer
CORR
2008
Springer
98views Education» more  CORR 2008»
15 years 1 months ago
Local Information Based Algorithms for Packet Transport in Complex Networks
Abstract. We introduce four algorithms for packet transport in complex networks. These algorithms use deterministic rules which depend, in different ways, on the degree of the node...
Bernard Kujawski, G. J. Rodgers, Bosiljka Tadic
CORR
2008
Springer
110views Education» more  CORR 2008»
15 years 1 months ago
Enhanced Direct and Indirect Genetic Algorithm Approaches for a Mall Layout and Tenant Selection Problem
During our earlier research, it was recognised that in order to be successful with an indirect genetic algorithm approach using a decoder, the decoder has to strike a balance betw...
Uwe Aickelin, Kathryn A. Dowsland
EOR
2010
133views more  EOR 2010»
15 years 1 months ago
A memetic algorithm for graph coloring
Given an undirected graph G = (V, E) with a set V of vertices and a set E of edges, the graph coloring problem consists of partitioning all vertices into k independent sets and th...
Zhipeng Lü, Jin-Kao Hao
COMCOM
2006
121views more  COMCOM 2006»
15 years 1 months ago
Application of anomaly detection algorithms for detecting SYN flooding attacks
Abstract-- We investigate statistical anomaly detection algorithms for detecting SYN flooding, which is the most common type of Denial of Service (DoS) attack. The two algorithms c...
Vasilios A. Siris, Fotini Papagalou
« Prev « First page 199 / 14246 Last » Next »