Sciweavers

1025 search results - page 101 / 205
» Improved Behaviour of Tries by the
Sort
View
CORR
2008
Springer
125views Education» more  CORR 2008»
15 years 1 months ago
Sensing Danger: Innate Immunology for Intrusion Detection
The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. Based on this idea, artificial immune systems have been used for...
Uwe Aickelin, Julie Greensmith
EOR
2008
106views more  EOR 2008»
15 years 1 months ago
Global and local real-coded genetic algorithms based on parent-centric crossover operators
Parent-centric real-parameter crossover operators create the offspring in the neighbourhood of one of the parents, the female parent. The other parent, the male one, defines the r...
Carlos García-Martínez, Manuel Lozan...
COR
2006
98views more  COR 2006»
15 years 1 months ago
Exploiting semidefinite relaxations in constraint programming
Constraint programming uses enumeration and search tree pruning to solve combinatorial optimization problems. In order to speed up this solution process, we investigate the use of...
Willem Jan van Hoeve
JCB
2008
96views more  JCB 2008»
15 years 1 months ago
Computing Knock-Out Strategies in Metabolic Networks
Given a metabolic network in terms of its metabolites and reactions, our goal is to efficiently compute the minimal knock out sets of reactions required to block a given behaviour....
Utz-Uwe Haus, Steffen Klamt, Tamon Stephen
103
Voted
RIA
2008
73views more  RIA 2008»
15 years 1 months ago
Representing and Manipulating Situation Hierarchies using Situation Lattices
Situations, the semantic interpretations of context, provide a better basis for selecting adaptive behaviours than context itself. The definition of situations typically rests on t...
Juan Ye, Lorcan Coyle, Simon A. Dobson, Paddy Nixo...