Sciweavers

3941 search results - page 368 / 789
» Computational Efficiency of Batching Methods
Sort
View
GECCO
2006
Springer
141views Optimization» more  GECCO 2006»
15 years 7 months ago
Applicability issues of the real-valued negative selection algorithms
The paper examines various applicability issues of the negative selection algorithms (NSA). Recently, concerns were raised on the use of NSAs, especially those using real-valued r...
Zhou Ji, Dipankar Dasgupta
138
Voted
EDBT
2000
ACM
15 years 7 months ago
Management and Query Processing of One-Dimensional Intervals with the UB-Tree
The management and query processing of one dimensional intervals is a special case of extended object handling. One dimensional intervals play an important role in temporal databa...
Robert Fenk
133
Voted
AAAI
2008
15 years 5 months ago
Minimizing the Spread of Contamination by Blocking Links in a Network
We address the problem of minimizing the propagation of undesirable things, such as computer viruses or malicious rumors, by blocking a limited number of links in a network, a dua...
Masahiro Kimura, Kazumi Saito, Hiroshi Motoda
WSC
2007
15 years 5 months ago
Cyber attack modeling and simulation for network security analysis
Cyber security methods are continually being developed. To test these methods many organizations utilize both virtual and physical networks which can be costly and time consuming....
Michael E. Kuhl, Jason Kistner, Kevin Costantini, ...
113
Voted
ESANN
2006
15 years 4 months ago
Cluster detection algorithm in neural networks
Complex networks have received much attention in the last few years, and reveal global properties of interacting systems in domains like biology, social sciences and technology. O...
David Meunier, Hélène Paugam-Moisy