Sciweavers

3483 search results - page 608 / 697
» Forward
Sort
View
AINA
2007
IEEE
15 years 4 months ago
Trust Enhanced Secure Mobile Ad-Hoc Network Routing
In recent years, several trust and reputation models have been proposed to enhance the security of mobile ad hoc networks. However, they either fail to capture evidence of trustwo...
Venkatesan Balakrishnan, Vijay Varadharajan, Phill...
CEC
2007
IEEE
15 years 4 months ago
Target shape design optimization by evolving splines
Abstract— Target shape design optimization problem (TSDOP) is a miniature model for real world design optimization problems. It is proposed as a test bed to design and analyze op...
Pan Zhang, Xin Yao, Lei Jia, Bernhard Sendhoff, Th...
88
Voted
CEC
2007
IEEE
15 years 4 months ago
Concerning the potential of evolutionary support vector machines
— Within the present paper, we put forward a novel hybridization between support vector machines and evolutionary algorithms. Evolutionary support vector machines consider the cl...
Ruxandra Stoean, Mike Preuss, Catalin Stoean, Dumi...
CSFW
2007
IEEE
15 years 4 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...
83
Voted
DATE
2007
IEEE
146views Hardware» more  DATE 2007»
15 years 4 months ago
DFM/DFY: should you trust the surgeon or the family doctor?
Everybody agrees that curing DFM/DFY issues is of paramount importance at 65 nanometers and beyond. Unfortunately, there is disagreement about how and when to cure them. “Surgeo...
Marco Casale-Rossi, Andrzej J. Strojwas, Robert C....