Sciweavers

20197 search results - page 3800 / 4040
» Comparing Computational Power
Sort
View
AIMS
2009
Springer
15 years 5 months ago
Evaluation of Sybil Attacks Protection Schemes in KAD
In this paper, we assess the protection mechanisms entered into recent clients to fight against the Sybil attack in KAD, a widely deployed Distributed Hash Table. We study three m...
Thibault Cholez, Isabelle Chrisment, Olivier Festo...
GECCO
2009
Springer
199views Optimization» more  GECCO 2009»
15 years 5 months ago
Using behavioral exploration objectives to solve deceptive problems in neuro-evolution
Encouraging exploration, typically by preserving the diversity within the population, is one of the most common method to improve the behavior of evolutionary algorithms with dece...
Jean-Baptiste Mouret, Stéphane Doncieux
79
Voted
HUC
2009
Springer
15 years 5 months ago
HydroSense: infrastructure-mediated single-point sensing of whole-home water activity
Recent work has examined infrastructure-mediated sensing as a practical, low-cost, and unobtrusive approach to sensing human activity in the physical world. This approach is based...
Jon Froehlich, Eric Larson, Tim Campbell, Conor Ha...
92
Voted
KDD
2009
ACM
173views Data Mining» more  KDD 2009»
15 years 5 months ago
Malware detection using statistical analysis of byte-level file content
Commercial anti-virus software are unable to provide protection against newly launched (a.k.a “zero-day”) malware. In this paper, we propose a novel malware detection techniqu...
S. Momina Tabish, M. Zubair Shafiq, Muddassar Faro...
LCPC
2009
Springer
15 years 5 months ago
Using the Meeting Graph Framework to Minimise Kernel Loop Unrolling for Scheduled Loops
This paper improves our previous research effort [1] by providing an efficient method for kernel loop unrolling minimisation in the case of already scheduled loops, where circular...
Mounira Bachir, David Gregg, Sid Ahmed Ali Touati
« Prev « First page 3800 / 4040 Last » Next »