Sciweavers

4049 search results - page 479 / 810
» Neural Network Trainer through Computer Networks
Sort
View
DSN
2007
IEEE
15 years 11 months ago
Fault Tolerant Planning for Critical Robots
Autonomous robots offer alluring perspectives in numerous application domains: space rovers, satellites, medical assistants, tour guides, etc. However, a severe lack of trust in t...
Benjamin Lussier, Matthieu Gallien, Jér&eac...
120
Voted
ICTAI
2007
IEEE
15 years 11 months ago
A Java-Based Distributed Genetic Algorithm Framework
Distributed Genetic Algorithm (DGA) is one of the most promising choices among the optimization methods. In this paper we describe DGAFrame, a flexible framework for evolutionary...
Gabi Escuela, Yudith Cardinale, Jorge Gonzá...
RAID
2001
Springer
15 years 9 months ago
Interfacing Trusted Applications with Intrusion Detection Systems
Abstract. In this paper we describe an interface between intrusion detection systems and trusted system components. The approach presented differs from conventional intrusion dete...
Marc G. Welz, Andrew Hutchison
172
Voted
PERCOM
2011
ACM
14 years 11 months ago
AnonySense: A system for anonymous opportunistic sensing
We describe AnonySense, a privacy-aware system for realizing pervasive applications based on collaborative, opportunistic sensing by personal mobile devices. AnonySense allows app...
Minho Shin, Cory Cornelius, Daniel Peebles, Apu Ka...
IWCMC
2006
ACM
15 years 10 months ago
Performance analysis of epidemic routing under contention
Epidemic routing has been proposed as a robust transmission scheme for sparse mobile ad hoc networks. Under the assumption of no contention, epidemic routing has the minimum end-t...
Apoorva Jindal, Konstantinos Psounis