Sciweavers

2900 search results - page 101 / 580
» On the Convergence of Immune Algorithms
Sort
View
JNCA
2006
86views more  JNCA 2006»
14 years 12 months ago
Real-time data attack isolation for commercial database applications
Traditional database security mechanisms are very limited in defending against data attacks. Authorized but malicious transactions can make a database useless by impairing its int...
Peng Liu, Hai Wang, Lunquan Li
COMCOM
2002
189views more  COMCOM 2002»
14 years 11 months ago
Intrusion detection techniques and approaches
Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion Detection systems offer techniques for modelling and...
Theuns Verwoerd, Ray Hunt
SSPR
2010
Springer
14 years 10 months ago
Fast Population Game Dynamics for Dominant Sets and Other Quadratic Optimization Problems
We propose a fast population game dynamics, motivated by the analogy with infection and immunization processes within a population of “players,” for finding dominant sets, a p...
Samuel Rota Bulò, Immanuel M. Bomze, Marcel...
CF
2010
ACM
14 years 10 months ago
Supporting lock-free composition of concurrent data objects
Lock-free data objects offer several advantages over their blocking counterparts, such as being immune to deadlocks and convoying and, more importantly, being highly concurrent. H...
Daniel Cederman, Philippas Tsigas
GECCO
2006
Springer
143views Optimization» more  GECCO 2006»
15 years 3 months ago
The correlation-triggered adaptive variance scaling IDEA
It has previously been shown analytically and experimentally that continuous Estimation of Distribution Algorithms (EDAs) based on the normal pdf can easily suffer from premature ...
Jörn Grahl, Peter A. N. Bosman, Franz Rothlau...