Sciweavers

9405 search results - page 252 / 1881
» Computing a Model of Set Theory
Sort
View
SSS
2007
Springer
130views Control Systems» more  SSS 2007»
15 years 10 months ago
Decentralized Detector Generation in Cooperative Intrusion Detection Systems
We consider Cooperative Intrusion Detection System (CIDS) which is a distributed AIS-based (Artificial Immune System) IDS where nodes collaborate over a peer-to-peer overlay netwo...
Rainer Bye, Katja Luther, Seyit Ahmet Çamte...
AAAI
2007
15 years 6 months ago
Model-lite Planning for the Web Age Masses: The Challenges of Planning with Incomplete and Evolving Domain Models
The automated planning community has traditionally focused on the efficient synthesis of plans given a complete domain theory. In the past several years, this line of work met wi...
Subbarao Kambhampati
SEC
2008
15 years 5 months ago
A Fuzzy Model for the Composition of Intrusion Detectors
The performance of an intrusion detector depends on several factors, like its internal architecture and the algorithms it uses. Thus, distinct detectors can behave distinctly when ...
Inez Raguenet, Carlos Maziero
FOGA
1994
15 years 5 months ago
Predictive Models Using Fitness Distributions of Genetic Operators
An important goal of the theory of genetic algorithms is to build predictive models of how well genetic algorithms are expected to perform, given a representation, a fitness lands...
John J. Grefenstette
AICOM
2002
103views more  AICOM 2002»
15 years 4 months ago
The emergent computational potential of evolving artificial living systems
The computational potential of artificial living systems can be studied without knowing the algorithms that govern their behavior. Modeling single organisms by means of socalled c...
Jirí Wiedermann, Jan van Leeuwen