Abstract is missing.
- Feature selection and classification in genetic programming: Application to haptic-based biometric dataFawaz A. Alsulaiman, Nizar Sakr, Julio J. Valde, Abdulmotaleb El-Saddik, Nicolas D. Georganas. 1-7 [doi]
- Fuzzy-neuro fault-tolerant control schemes for aircraft autolanding under actuator failuresHai-Jun Rong, Narasimhan Sundararajan. 1-8 [doi]
- Simulation analysis on destabilization of complex adaptive organizationsIl-Chul Moon. 1-8 [doi]
- Passive multitarget tracking using transmitters of opportunityRatnasingham Tharmarasa, Thia Kirubarajan, Mike McDonald. 1-8 [doi]
- Control of unmanned aerial vehicles for passive detection and tracking of multiple emittersPeter Sarunic, Robin J. Evans, Bill Moran. 1-7 [doi]
- Emitter geolocation using low-accuracy direction-finding sensorsDerek Elsaesser. 1-7 [doi]
- Incremental adaptation of fuzzy ARTMAP neural networks for video-based face classificationJean-François Connolly, Eric Granger, Robert Sabourin. 1-8 [doi]
- Tracking a moving hypothesis for visual data with explicit switch detectionJason P. Rhinelander, Peter X. Liu. 1-8 [doi]
- Canadian artic Sovereignty: Local intervention by flocking UAVsGilles Labonté. 1-8 [doi]
- Testing harbour patrol and interception policies using particle-swarm-based learning of cooperative behaviorTom Flanagan, Chris Thornton, Jörg Denzinger. 1-8 [doi]
- An optimisation model for airlift load planning: Galahad and the quest for the 'holy grail'Bohdan Kaluzny, R. H. A. David Shaw, Ahmed Ghanmi, Beomjoon Kim. 1-8 [doi]
- Fast localization in indoor environmentsRimon Elias, Amal Elnahas. 1-6 [doi]
- Information assurances and threat identification in networked organizationsTerrill L. Frantz, Kathleen M. Carley. 1-5 [doi]
- Autonomous control laws for mobile robotic surveillance swarmsRobert J. Mullen, Dorothy Ndedi Monekosso, Sarah A. Barman, Paolo Remagnino. 1-6 [doi]
- Detection & study of DDoS attacks via entropy in data network modelsAnna T. Lawniczak, Bruno N. Di Stefano, Hao Wu 0002. 1-8 [doi]
- Adaptive neural flight control system for helicopterSuresh Suresh. 1-8 [doi]
- Iris biometric authentication based on local global graphs: An FPGA implementationRaghudeep Kannavara, Nikolaos G. Bourbakis. 1-7 [doi]
- mTRACK - Monitoring time-varying relations in approximately categorised knowledgeTrevor Martin, Yun Shen. 1-8 [doi]
- Bias phenomenon and analysis of a nonlinear transformation in a mobile passive sensor networkZhen Ding, Henry Leung. 1-5 [doi]
- Traffic to protocol reverse engineeringAntonio Trifilo, Stefan Burschka, Ernst Biersack. 1-8 [doi]
- Multisensor-multitarget tracking testbedDavid Akselrod, Ratnasingham Tharmarasa, Thia Kirubarajan, Zhen Ding, Tony Ponsford. 1-6 [doi]
- Evolving TCP/IP packets: A case study of port scansPatrick LaRoche, A. Nur Zincir-Heywood, Malcolm I. Heywood. 1-8 [doi]
- Localization of door handle using a single camera on a door opening mobile manipulatorDmitri Ignakov, Galina Okouneva, Guangjun Liu. 1-7 [doi]
- Dynamical networks as a tool for system analysis and explorationIrene Pestov, Simona Verga. 1-8 [doi]
- Online biometric authentication using hand vein patternsAmioy Kumar, Madasu Hanmandlu, H. M. Gupta. 1-7 [doi]
- Joint path planning and sensor subset selection for multistatic sensor networksRatnasingham Tharmarasa, Thia Kirubarajan, Thomas Lang. 1-8 [doi]
- Detection of slow malicious worms using multi-sensor data fusionFrank Akujobi, Ioannis Lambadaris, Evangelos Kranakis. 1-9 [doi]
- A framework for the design of a military operational supply networkAhmed Ghanmi, Alain Martel, Jean Berger, Abdeslem Boukhtouta. 1-9 [doi]
- Bio-inspired computing for launch vehicle design and trajectory optimizationSuresh Sundaram, Hai-Jun Rong, Narasimhan Sundararajan. 1-8 [doi]
- Local feature analysis for robust face recognitionEhsan Fazl Ersi, John K. Tsotsos. 1-6 [doi]
- Collaborative architecture for distributed intrusion detection systemSafaa Zaman, Fakhri Karray. 1-7 [doi]
- He says, she says. Pat says, Tricia says. How much reference resolution matters for entity extraction, relation extraction, and social network analysisJana Diesner, Kathleen M. Carley. 1-8 [doi]
- A detailed analysis of the KDD CUP 99 data setMahbod Tavallaee, Ebrahim Bagheri, Wei Lu, Ali A. Ghorbani. 1-6 [doi]
- New search algorithm for randomly located objects: A non-cooperative agent based approachDragos Calitoiu. 1-6 [doi]
- Goal-driven semi-automated generation of semantic modelsAnthony Stirtzinger, Craig S. Anken, Bruce McQueary. 1-7 [doi]
- Integrating reasoning with personality effects in simulated operatorsRuibiao J. Guo, Brad Cain. 1-8 [doi]
- Minimizing risk on a fleet mix problem with a multiobjective evolutionary algorithmMichael Mazurek, Slawomir Wesolkowski. 1-7 [doi]
- Optimizing anomaly detector deployment under evolutionary black-box vulnerability testingH. Gunes Kayack, A. Nur Zincir-Heywood, Malcolm I. Heywood, Stefan Burschka. 1-8 [doi]
- Machine learning based encrypted traffic classification: Identifying SSH and SkypeRiyad Alshammari, A. Nur Zincir-Heywood. 1-8 [doi]
- Evolution and evaluation of biometric systemsDmitry O. Gorodnichy. 1-8 [doi]
- Application of voiced-speech variability descriptors to emotion recognitionKrzysztof Slot, Jaroslaw Cichosz, Lukasz Bronakowski. 1-5 [doi]
- BlastSim - Multi agent simulation of suicide bombingZeeshan-ul-hassan Usmani, Fawzi A. Alghamdi, Daniel Kirk. 1-8 [doi]
- Multiple UAV teams for multiple tasksP. B. Sujit, João Borges de Sousa, Fernando Lobo Pereira. 1-8 [doi]
- Analysis of the 1999 DARPA/Lincoln Laboratory IDS evaluation data with NetADHICTCarson Brown, Alex Cowperthwaite, Abdulrahman Hijazi, Anil Somayaji. 1-7 [doi]
- A comparison of techniques for on-line incremental learning of HMM parameters in anomaly detectionWael Khreich, Eric Granger, Ali Miri, Robert Sabourin. 1-8 [doi]
- Robust line extraction based on repeated segment directions on image contoursAndres Solis Montero, Amiya Nayak, Milos Stojmenovic, Nejib Zaguia. 1-7 [doi]
- Neural-based iterative approach for iris detection in iris recognition systemsRuggero Donida Labati, Vincenzo Piuri, Fabio Scotti. 1-6 [doi]
- Secure two and multi-party association rule miningSaeed Samet, Ali Miri. 1-6 [doi]