Sciweavers

204 search results - page 28 / 41
» el 2006
Sort
View
88
Voted
IJNSEC
2007
147views more  IJNSEC 2007»
14 years 10 months ago
A Genetic Algorithm for Cryptanalysis of DES-8
Various cryptosystems exploit exhaustive techniques to search, missing-the-mark, key space. Such search techniques should be guided in order to be computationally adequate. Here, ...
Hasan Mohammed Hasan Husein, Bayoumi I. Bayoumi, F...
82
Voted
IJON
2010
148views more  IJON 2010»
14 years 8 months ago
Modeling radiation-induced lung injury risk with an ensemble of support vector machines
Radiation-induced lung injury, radiation pneumonitis (RP), is a potentially fatal side-effect of thoracic radiation therapy. In this work, using an ensemble of support vector mac...
Todd W. Schiller, Yixin Chen, Issam El-Naqa, Josep...
ISCI
2010
175views more  ISCI 2010»
14 years 8 months ago
Clustering web people search results using fuzzy ants
Person name queries often bring up web pages that correspond to individuals sharing the same name. The Web People Search (WePS) task consists of organizing search results for ambi...
Els Lefever, Timur Fayruzov, Véronique Host...
179
Voted
AOIS
2006
14 years 11 months ago
Providing Contextual Norm Information in Open Multi-Agent Systems
Agents can freely migrate among open MASs in order to obtain resources or services not found locally. In this scenario, agent actions should be guided for avoiding unexpected behav...
Carolina Howard Felicíssimo, Ricardo Choren...
PE
2006
Springer
193views Optimization» more  PE 2006»
14 years 10 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...