Sciweavers

757 search results - page 149 / 152
» clear 2007
Sort
View
ICC
2007
IEEE
128views Communications» more  ICC 2007»
14 years 10 months ago
The Power of Temporal Pattern Processing in Anomaly Intrusion Detection
Abstract— A clear deficiency in most of todays Anomaly Intrusion Detection Systems (AIDS) is their inability to distinguish between a new form of legitimate normal behavior and ...
Mohammad Al-Subaie, Mohammad Zulkernine
BMCBI
2010
125views more  BMCBI 2010»
14 years 10 months ago
Compartmentalization of the Edinburgh Human Metabolic Network
Background: Direct in vivo investigation of human metabolism is complicated by the distinct metabolic functions of various sub-cellular organelles. Diverse micro-environments in d...
Tong Hao, Hongwu Ma, Xue-Ming Zhao, Igor Goryanin
FGCS
2008
103views more  FGCS 2008»
14 years 10 months ago
A case for cooperative and incentive-based federation of distributed clusters
Research interest in Grid computing has grown significantly over the past five years. Management of distributed resources is one of the key issues in Grid computing. Central to ma...
Rajiv Ranjan, Aaron Harwood, Rajkumar Buyya
ISCI
2008
159views more  ISCI 2008»
14 years 10 months ago
Large scale evolutionary optimization using cooperative coevolution
Evolutionary algorithms (EAs) have been applied with success to many numerical and combinatorial optimization problems in recent years. However, they often lose their effectivenes...
Zhenyu Yang, Ke Tang, Xin Yao
CORR
2007
Springer
141views Education» more  CORR 2007»
14 years 10 months ago
Acyclicity of Preferences, Nash Equilibria, and Subgame Perfect Equilibria: a Formal and Constructive Equivalence
Abstract. Sequential game and Nash equilibrium are basic key concepts in game theory. In 1953, Kuhn showed that every sequential game has a Nash equilibrium. The two main steps of ...
Stéphane Le Roux