Sciweavers

6293 search results - page 1047 / 1259
» Information Flow Testing
Sort
View
GECCO
2006
Springer
143views Optimization» more  GECCO 2006»
15 years 8 months ago
DECA: dimension extracting coevolutionary algorithm
Coevolution has often been based on averaged outcomes, resulting in unstable evaluation. Several theoretical approaches have used archives to provide stable evaluation. However, t...
Edwin D. de Jong, Anthony Bucci
ACSAC
2001
IEEE
15 years 8 months ago
Temporal Signatures for Intrusion Detection
We introduce a new method for detecting intrusions based on the temporal behavior of applications. It builds on an existing method of application intrusion detection developed at ...
Anita Jones, Song Li
ARITH
2001
IEEE
15 years 8 months ago
On-line Arithmetic for Detection in Digital Communication Receivers
This paper demonstrates the advantages of using on-line arithmetic for traditional and advanced detection algorithms for communication systems. Detection is one of the core comput...
Sridhar Rajagopal, Joseph R. Cavallaro
CIARP
2003
Springer
15 years 8 months ago
Uniclass and Multiclass Connectionist Classification of Dialogue Acts
Classification problems are traditionally focused on uniclass samples, that is, each sample of the training and test sets has one unique label, which is the target of the classific...
María José Castro Bleda, David Vilar...
FPGA
2000
ACM
175views FPGA» more  FPGA 2000»
15 years 8 months ago
An FPGA implementation and performance evaluation of the Serpent block cipher
With the expiration of the Data Encryption Standard (DES) in 1998, the Advanced Encryption Standard (AES) development process is well underway. It is hoped that the result of the ...
Adam J. Elbirt, Christof Paar
« Prev « First page 1047 / 1259 Last » Next »