Sciweavers

2263 search results - page 362 / 453
» Principles of Template Design
Sort
View
120
Voted
ESORICS
2007
Springer
15 years 10 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
131
Voted
GECCO
2007
Springer
230views Optimization» more  GECCO 2007»
15 years 10 months ago
Activation energy-based simulation for self-assembly of multi-shape tiles
Building artificial systems using self-assembly is one of the main issues of artificial life [17]. Scientists are trying to understand this process either using experimental appro...
Mostafa Mostafa Hashim Ellabaan
121
Voted
GECCO
2007
Springer
177views Optimization» more  GECCO 2007»
15 years 10 months ago
Evolving problem heuristics with on-line ACGP
Genetic Programming uses trees to represent chromosomes. The user defines the representation space by defining the set of functions and terminals to label the nodes in the trees. ...
Cezary Z. Janikow
139
Voted
GECCO
2007
Springer
481views Optimization» more  GECCO 2007»
15 years 10 months ago
A hybrid PSO/ACO algorithm for classification
In a previous work we have proposed a hybrid Particle Swarm Optimisation/Ant Colony Optimisation (PSO/ACO) algorithm for the discovery of classification rules, in the context of d...
Nicholas Holden, Alex Alves Freitas
120
Voted
ICCS
2007
Springer
15 years 10 months ago
A Combined Hardware/Software Optimization Framework for Signal Representation and Recognition
This paper describes a signal recognition system that is jointly optimized from mathematical representation, algorithm design and final implementation. The goal is to exploit sign...
Melina Demertzi, Pedro C. Diniz, Mary W. Hall, Ann...