Sciweavers

1105 search results - page 132 / 221
» Optimizing genetic algorithm strategies for evolving network...
Sort
View
GECCO
2007
Springer
170views Optimization» more  GECCO 2007»
15 years 4 months ago
An evolutionary keystroke authentication based on ellipsoidal hypothesis space
Keystroke authentication is a biometric method utilizing the typing characteristics of users. In this paper, we propose an evolutionary method for stable keystroke authentication....
Jae-Wook Lee, Sung-Soon Choi, Byung Ro Moon
GECCO
2005
Springer
128views Optimization» more  GECCO 2005»
15 years 3 months ago
Collaborative interactive evolution
Interactive evolutionary computation (IEC) has proven useful in a variety of applications by combining the subjective evaluation of a user with the massive parallel search power o...
Sean R. Szumlanski, Annie S. Wu, Charles E. Hughes
DEXAW
1999
IEEE
124views Database» more  DEXAW 1999»
15 years 2 months ago
A Web-Based Evolutionary Model for Internet Data Caching
Caching is a standard solution to the problem of insufcient bandwidth caused by the rapid increase of information circulation across the Internet. Cache consistency mechanisms are...
Athena Vakali
BTW
2009
Springer
127views Database» more  BTW 2009»
15 years 4 months ago
In-Network Detection of Anomaly Regions in Sensor Networks with Obstacles
: In the past couple of years, sensor networks have evolved to a powerful infrastructure component for monitoring and tracking events and phenomena in many application domains. An ...
Conny Franke, Marcel Karnstedt, Daniel Klan, Micha...
GLOBECOM
2007
IEEE
15 years 4 months ago
Stochastic Channel Selection in Cognitive Radio Networks
— In this paper, we investigate the channel selection strategy for secondary users in cognitive radio networks. We claim that in order to avoid the costly channel switchings, a s...
Yang Song, Yuguang Fang, Yanchao Zhang