Sciweavers

4581 search results - page 843 / 917
» Distributed optimization in sensor networks
Sort
View
ACSAC
2004
IEEE
15 years 8 months ago
Using Predators to Combat Worms and Viruses: A Simulation-Based Study
Large-scale attacks generated by fast-spreading or stealthy malicious mobile code, such as flash worms and e-mail viruses, demand new approaches to patch management and disinfecti...
Ajay K. Gupta 0002, Daniel C. DuVarney
TCC
2009
Springer
132views Cryptology» more  TCC 2009»
16 years 5 months ago
Authenticated Adversarial Routing
: The aim of this paper is to demonstrate the feasibility of authenticated throughput-ecient routing in an unreliable and dynamically changing synchronous network in which the majo...
Yair Amir, Paul Bunn, Rafail Ostrovsky
GECCO
2009
Springer
199views Optimization» more  GECCO 2009»
15 years 9 months ago
Using behavioral exploration objectives to solve deceptive problems in neuro-evolution
Encouraging exploration, typically by preserving the diversity within the population, is one of the most common method to improve the behavior of evolutionary algorithms with dece...
Jean-Baptiste Mouret, Stéphane Doncieux
155
Voted
ICC
2007
IEEE
124views Communications» more  ICC 2007»
15 years 11 months ago
On the Performance of IEEE 802.16 OFDMA System Under Different Frequency Reuse and Subcarrier Permutation Patterns
— In interference-limited wireless cellular systems, interference avoidance and interference averaging are widely adopted to combat co-channel interference. In different types of...
Huiling Jia, Zhaoyang Zhang, Guanding Yu, Peng Che...
140
Voted
ICMCS
2006
IEEE
141views Multimedia» more  ICMCS 2006»
15 years 11 months ago
Ripple-Stream: Safeguarding P2P Streaming Against Dos Attacks
— Compared with file-sharing and distributed hash table (DHT) network, P2P streaming is more vulnerable to denial of service (DoS) attacks because of its high bandwidth demand a...
Wenjie Wang, Yongqiang Xiong, Qian Zhang, Sugih Ja...