1
Published 2010
Table of Contents: ... -- Runtime Analysis of Evolutionary Programming Based on Cauchy Mutation -- Best Hiding Capacity Scheme...
View full text
Electronic eBook
2
Published 2013
Table of Contents: ... Using Genetic Programming -- Implicit Fitness Sharing for Evolutionary Synthesis of License Plate...
View full text
Electronic eBook
3
Published 2012
Table of Contents: ... Evolutionary Chain of Evidence for Compliance with Safety Standards -- A New Approach to Assessment...
View full text
Electronic eBook
4
Published 2015
Table of Contents: ... of Information Retrieval -- 3. High Payload Reversible Watermarking for Securing Medical Images in a Cloud...
View full text
Electronic eBook
5
Published 2006
Table of Contents: ...Keynote Speech -- Data Mining for Security Applications -- Web and Text Mining for Terrorism...
View full text
Electronic eBook
6
Published 2010
Table of Contents: ... for Analyzing Running Times of Parallel Evolutionary Algorithms -- Negative Drift in Populations -- Log...
View full text
Electronic eBook
7
Published 2015
Table of Contents: ... Bi-level Evolutionary Algorithm for Multi-Objective Vehicle Routing Problems with Time Window...
View full text
Electronic eBook
8
Published 2008
Table of Contents: ... -- A Framework for Contract-Policy Matching Based on Symbolic Simulations for Securing Mobile Device...
View full text
Electronic eBook
9
Table of Contents: ... Matching. Evolutionary Image Processing. Summary -- Network Security. Cryptographic Applications. Network...
View full text
Electronic eBook
10
Published 2007
Table of Contents: ... Decentralized Parallel I/O Scheduling Strategies for Parallel File Systems -- Distributed Security Constrained...
View full text
Electronic eBook
11
Published 2010
Table of Contents: ... for Software Quality -- Security Scheme for Managing a Large Quantity of Individual Information in RFID...
View full text
Electronic eBook
12
Published 2010
Table of Contents: ... on Real Space and Digital Space Symbiosis -- Workshop on Information Retrieval, Security and Innovative...
View full text
Electronic eBook
13
Published 2007
Table of Contents: ... Execution of Parallel Processes: Penetrating NATs over the Grid -- Parallelization of C# Programs Through...
View full text
Electronic eBook
14
Published 2005
Table of Contents: ... -- Distributed and Parallel Algorithms -- On the Abstraction of Message-Passing Communications Using Algorithmic...
View full text
Electronic eBook
15
Published 2014
Table of Contents: ... and Operational States of Wind Turbines -- The Parallel Approach to the Conjugate Gradient Learning Algorithm...
View full text
Electronic eBook
16
Published 2008
Table of Contents: ... of a Novel Integer Programming Model to Deal with Energy Consumption in Heterogeneous Wireless Sensor...
View full text
Electronic eBook
17
Published 2006
Table of Contents: ... in Agent-Based Evolutionary Optimization -- An Immunological and an Ethically-social Approach to Security...
View full text
Electronic eBook
18
Published 2005
Table of Contents: ...) -- Letter Based Text Scoring Method for Language Identification -- Parallel and Distributed Data Processing...
View full text
Electronic eBook
19
Published 2007
Table of Contents: ... Learning to Analyze Migration Parameters in Parallel Genetic Algorithms -- Collaborative Evolutionary Swarm...
View full text
Electronic eBook
20
Published 2015
Table of Contents: ... in Computer Aided Design -- Software Framework for Modular Machine Learning Systems -- Parallel cost function...
View full text
Electronic eBook