Sciweavers

914 search results - page 97 / 183
» Effective vaccination policies
Sort
View
104
Voted
ACSAC
2006
IEEE
15 years 4 months ago
Specification-Based Intrusion Detection in WLANs
Wireless networking technologies based on the IEEE 802.11 series of standards fail to authenticate management frames and network card addresses and suffer from serious vulnerabili...
Rupinder Gill, Jason Smith, Andrew Clark
102
Voted
BROADNETS
2004
IEEE
15 years 4 months ago
On Wavelength Assignment in Optical Burst Switched Networks
A fundamental assumption underlying most studies of optical burst switched (OBS) networks is that full wavelength conversion is available throughout the network. In practice, howev...
Jing Teng, George N. Rouskas
92
Voted
EEE
2004
IEEE
15 years 4 months ago
Secure Online Examination Architecture Based on Distributed Firewall
Online (Web-based) examination is an effective solution for mass education evaluation. However, due to the incomplete of network security, students can communicate with each other...
Chi-Chien Pan, Kai-Hsiang Yang, Tzao-Lin Lee
109
Voted
GECCO
2006
Springer
208views Optimization» more  GECCO 2006»
15 years 4 months ago
Comparing evolutionary and temporal difference methods in a reinforcement learning domain
Both genetic algorithms (GAs) and temporal difference (TD) methods have proven effective at solving reinforcement learning (RL) problems. However, since few rigorous empirical com...
Matthew E. Taylor, Shimon Whiteson, Peter Stone
123
Voted
GECCO
2000
Springer
143views Optimization» more  GECCO 2000»
15 years 4 months ago
A Genetic Algorithm for Automatically Designing Modular Reinforcement Learning Agents
Reinforcement learning (RL) is one of the machine learning techniques and has been received much attention as a new self-adaptive controller for various systems. The RL agent auto...
Isao Ono, Tetsuo Nijo, Norihiko Ono