From post

Towards Byte Code Genetic Programming

, , и . Proceedings of the Genetic and Evolutionary Computation Conference, 2, стр. 1234. Orlando, Florida, USA, Morgan Kaufmann, (13-17 July 1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Byte Code Genetic Programming, , и . Late Breaking Papers at the Genetic Programming 1998 Conference, University of Wisconsin, Madison, Wisconsin, USA, Stanford University Bookstore, (22-25 July 1998)Analysis of an Algorithm for Distributed Recognition and Accountability., , , , , , и . ACM Conference on Computer and Communications Security, стр. 154-164. ACM, (1993)The Policy Machine for Security Policy Management., , и . International Conference on Computational Science (2), том 2074 из Lecture Notes in Computer Science, стр. 494-506. Springer, (2001)DualTrust: A Distributed Trust Model for Swarm-Based Autonomic Computing Systems., , , , и . DPM/SETOP, том 6514 из Lecture Notes in Computer Science, стр. 188-202. Springer, (2010)Joining the Security Education Community., и . IEEE Secur. Priv., 2 (5): 61-63 (2004)Formalizing End-to-End Context-Aware Trust Relationships in Collaborative Activities., , , и . SECRYPT, стр. 546-553. INSTICC Press, (2008)Cognitive task analysis of network analysts and managers for network situational awareness., , , , и . VDA, том 7530 из SPIE Proceedings, стр. 75300. SPIE, (2010)Who Owns Your Computer?, и . IEEE Secur. Priv., 4 (2): 61-63 (2006)Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory., и . ACM Southeast Regional Conference (2), стр. 142-147. ACM, (2005)1-59593-059-0.Configurable Middleware-Level Intrusion Detection for Embedded Systems., , , и . ICDCS Workshops, стр. 144-151. IEEE Computer Society, (2005)