Sciweavers

2771 search results - page 505 / 555
» Using Computational Reflection in Optimistic Distributed Sim...
Sort
View
GECCO
2010
Springer
155views Optimization» more  GECCO 2010»
15 years 7 months ago
Negative selection algorithms without generating detectors
Negative selection algorithms are immune-inspired classifiers that are trained on negative examples only. Classification is performed by generating detectors that match none of ...
Maciej Liskiewicz, Johannes Textor
CCS
2010
ACM
15 years 3 months ago
Securing wireless sensor networks against large-scale node capture attacks
Securing wireless sensor networks against node capture is a challenging task. All well-known random key pre-distribution systems, including the Eschenauer and Gligor's pionee...
Tuan Manh Vu, Reihaneh Safavi-Naini, Carey William...
BMCBI
2007
153views more  BMCBI 2007»
15 years 2 months ago
Estimating genealogies from linked marker data: a Bayesian approach
Background: Answers to several fundamental questions in statistical genetics would ideally require knowledge of the ancestral pedigree and of the gene flow therein. A few examples...
Dario Gasbarra, Matti Pirinen, Mikko J. Sillanp&au...
SIAMCOMP
2000
118views more  SIAMCOMP 2000»
15 years 2 months ago
Constructive, Deterministic Implementation of Shared Memory on Meshes
This paper describes a scheme to implement a shared address space of size m on an n-node mesh, with m polynomial in n, where each mesh node hosts a processor and a memory module. A...
Andrea Pietracaprina, Geppino Pucci, Jop F. Sibeyn
MOBIHOC
2003
ACM
16 years 2 months ago
Topology management in ad hoc networks
The efficiency of a communication network depends not only on its control protocols, but also on its topology. We propose a distributed topology management algorithm that construc...
Lichun Bao, J. J. Garcia-Luna-Aceves