We address the problem of confidentiality in scenarios where the attacker is not only able to observe the communication between principals, but can also fully compromise the commu...
Abstract. This paper describes the application of four evolutionary algorithms to the pruning of neural networks used in classification problems. Besides of a simple genetic algor...
Real stochastic processes operating in continuous time can be modeled by sets of stochastic differential equations. On the other hand, several popular model families, including hi...
Abstract— Communication messages in vehicular ad hoc networks (VANET) can be used to locate and track vehicles. While tracking can be beneficial for vehicle navigation, it can a...
Krishna Sampigethaya, Mingyan Li, Leping Huang, Ra...
This paper investigates the evolution of autonomous agents that solve a memorydependent counting task. Two types of neurocontrollers are evolved: networks of McCulloch-Pitts neuro...