Sciweavers

3400 search results - page 580 / 680
» tools 2008
Sort
View
GECCO
2008
Springer
116views Optimization» more  GECCO 2008»
15 years 6 months ago
Evolving similarity functions for code plagiarism detection
Students are often asked to submit electronic copies of their program code as part of assessment in computer science courses. To counter code plagiarism, educational institutions ...
Victor Ciesielski, Nelson Wu, Seyed M. M. Tahaghog...
GECCO
2008
Springer
116views Optimization» more  GECCO 2008»
15 years 6 months ago
Multi-objective memetic approach for flexible process sequencing problems
This paper describes a multi-objective memetic approach for solving multi-objective flexible process sequencing problems in flexible manufacturing systems (FMSs). FMS can be des...
Jian-Hong Chen, Jian-Hung Chen
GG
2008
Springer
15 years 6 months ago
Workshop on Graph Computation Models
A variety of computation models have been developed using graphs and graph transformations. These include models for sequential, distributed, parallel or mobile computation. A grap...
Mohamed Mosbah, Annegret Habel
GLOBECOM
2008
IEEE
15 years 6 months ago
Mobile Solution for Three-Tier Biofeedback Data Acquisition and Processing
— Wireless sensor networks span from military applications into everyday life. Body sensor networks greatly benefit from wireless sensor networks to answer the biofeedback challe...
Orlando R. E. Pereira, Paulo A. C. S. Neves, Joel ...
GLOBECOM
2008
IEEE
15 years 6 months ago
Bypassing Security Toolbars and Phishing Filters via DNS Poisoning
—Security toolbars are used to protect naive users against phishing attacks by displaying warnings on suspicious sites. Recently, web browsers have added built-in phishing filte...
Saeed Abu-Nimeh, Suku Nair