Sciweavers

13180 search results - page 2387 / 2636
» Network Models
Sort
View
GECCO
2004
Springer
121views Optimization» more  GECCO 2004»
15 years 9 months ago
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the des...
Gerry V. Dozier, Douglas Brown, John Hurley, Kryst...
HYBRID
2004
Springer
15 years 9 months ago
Understanding the Bacterial Stringent Response Using Reachability Analysis of Hybrid Systems
Abstract. In this paper we model coupled genetic and metabolic networks as hybrid systems. The vector fields are multi - affine, i.e., have only product - type nonlinearities to a...
Calin Belta, Peter Finin, Luc C. G. J. M. Habets, ...
CDC
2009
IEEE
162views Control Systems» more  CDC 2009»
15 years 8 months ago
Distributed optimal planning: an approach by weighted automata calculus
— We consider a distributed system modeled as a possibly large network of automata. Planning in this system consists in selecting and organizing actions in order to reach a goal ...
Eric Fabre, Loig Jezequel
ACSC
2004
IEEE
15 years 7 months ago
Flexible Layering in Hierarchical Drawings with Nodes of Arbitrary Size
Graph drawing is an important area of information visualization which concerns itself with the visualization of relational data structures. Relational data like networks, hierarch...
Carsten Friedrich, Falk Schreiber
IDEAL
2000
Springer
15 years 7 months ago
Quantization of Continuous Input Variables for Binary Classification
Quantization of continuous variables is important in data analysis, especially for some model classes such as Bayesian networks and decision trees, which use discrete variables. Of...
Michal Skubacz, Jaakko Hollmén
« Prev « First page 2387 / 2636 Last » Next »