In phishing and pharming, users could be easily tricked into submitting their username/passwords into fraudulent web sites whose appearances look similar as the genuine ones. The ...
The rapid adoption of location tracking and mobile social networking technologies raises significant privacy challenges. Today our understanding of people's location sharing ...
Eran Toch, Justin Cranshaw, Paul Hankes Drielsma, ...
Providing sustainable energy is one of the fundamental challenges for mankind. With energy usage being a part of everyday activities and with the increasingly diversity of energy ...
Albrecht Schmidt, Adrian Friday, Hans-Werner Gelle...
Abstract. This contribution studies speciation from the standpoint of evolutionary robotics (ER). A common approach to ER is to design a robot’s control system using neuro-evolut...
We propose a new class of crossover operators for genetic algorithms (CrossNet) which use a network-based (or graphbased) chromosomal representation. We designed CrossNet with the...