Sciweavers

2900 search results - page 100 / 580
» On the Convergence of Immune Algorithms
Sort
View
TEC
2002
128views more  TEC 2002»
14 years 11 months ago
A framework for evolutionary optimization with approximate fitness functions
It is not unusual that an approximate model is needed for fitness evaluation in evolutionary computation. In this case, the convergence properties of the evolutionary algorithm are...
Yaochu Jin, Markus Olhofer, Bernhard Sendhoff
MICCAI
2006
Springer
16 years 25 days ago
Registration of Microscopic Iris Image Sequences Using Probabilistic Mesh
Abstract. This paper explores the use of deformable mesh for registration of microscopic iris image sequences. The registration, as an effort for stabilizing and rectifying images ...
Xubo B. Song, Andriy Myronenko, Stephen R. Plank, ...
ICARIS
2004
Springer
15 years 5 months ago
Online Negative Databases
The benefits of negative detection for obscuring information are explored in the context of Artificial Immune Systems (AIS). AIS based on string matching have the potential for a...
Fernando Esponda, Elena S. Ackley, Stephanie Forre...
SACRYPT
2004
Springer
105views Cryptology» more  SACRYPT 2004»
15 years 5 months ago
FOX : A New Family of Block Ciphers
In this paper, we describe the design of a new family of block ciphers based on a Lai-Massey scheme, named FOX. The main features of this design, besides a very high security level...
Pascal Junod, Serge Vaudenay
MOBICOM
2000
ACM
15 years 4 months ago
Intrusion detection in wireless ad-hoc networks
As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particula...
Yongguang Zhang, Wenke Lee