Sciweavers

384 search results - page 64 / 77
» hybrid 2004
Sort
View
GECCO
2004
Springer
121views Optimization» more  GECCO 2004»
15 years 3 months ago
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the des...
Gerry V. Dozier, Douglas Brown, John Hurley, Kryst...
ICBA
2004
Springer
224views Biometrics» more  ICBA 2004»
15 years 3 months ago
Matching 2.5D Scans for Face Recognition
Abstract. The performance of face recognition systems that use twodimensional images is dependent on consistent conditions such as lighting, pose, and facial appearance. We are dev...
Xiaoguang Lu, Dirk Colbry, Anil K. Jain
ICCS
2004
Springer
15 years 3 months ago
Applying Grid Computing to the Parameter Sweep of a Group Difference Pseudopotential
Theoretical modeling of chemical and biological processes is a key to understand nature and to predict experiments. Unfortunately, this is very data and computation extensive. Howe...
Wibke Sudholt, Kim Baldridge, David Abramson, Coli...
ITS
2004
Springer
124views Multimedia» more  ITS 2004»
15 years 2 months ago
Combining Competing Language Understanding Approaches in an Intelligent Tutoring System
When implementing a tutoring system that attempts a deep understanding of students’ natural language explanations, there are three basic approaches to choose between; symbolic, i...
Pamela W. Jordan, Maxim Makatchev, Kurt VanLehn
LSO
2004
Springer
15 years 2 months ago
COTS Evaluation Supported by Knowledge Bases
Selection of Commercial-off-The-Shelf (COTS) software products is a knowledge-intensive process. In this paper, we show how knowledge bases can be used to facilitate the COTS selec...
Abdallah Mohamed, Tom Wanyama, Günther Ruhe, ...