Sciweavers

2477 search results - page 268 / 496
» Object list controlled process data system
Sort
View
135
Voted
GECCO
2006
Springer
178views Optimization» more  GECCO 2006»
15 years 7 months ago
A dynamic approach to artificial immune systems utilizing neural networks
The purpose of this work is to propose an immune-inspired setup to use a self-organizing map as a computational model for the interaction of antigens and antibodies. The proposed ...
Stefan Schadwinkel, Werner Dilger
125
Voted
IMECS
2007
15 years 5 months ago
Multi-Application Authentication Based on Multi-Agent System
— This paper proposes an authentication approach to support multi-clients in using a multi-application based environment. The approach is primarily based on the public key infras...
Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Jun...
170
Voted
EUSFLAT
2009
163views Fuzzy Logic» more  EUSFLAT 2009»
15 years 1 months ago
A Fuzzy Set Approach to Ecological Knowledge Discovery
Besides the problem of searching for effective methods for extracting knowledge from large databases (KDD) there are some additional problems with handling ecological data, namely ...
Arkadiusz Salski
146
Voted
AUSDM
2008
Springer
271views Data Mining» more  AUSDM 2008»
15 years 5 months ago
Classification of Brain-Computer Interface Data
In this paper we investigate the classification of mental tasks based on electroencephalographic (EEG) data for Brain Computer Interfaces (BCI) in two scenarios: off line and on-l...
Omar AlZoubi, Irena Koprinska, Rafael A. Calvo
129
Voted
ACSC
2006
IEEE
15 years 9 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson