default search action
CISDA 2011: Paris, France
- 2011 IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2011, Paris, France, April 15, 2011. IEEE 2011, ISBN 978-1-4244-9941-0
Computational Intelligence in Support of Maritime Operations
- Chris Thornton, Tom Flanagan, Jörg Denzinger, Jeffrey E. Boyd:
Evaluating goal ordering structures for testing harbour security policies. 1-8 - Christopher Strode:
Optimising multistatic sensor locations using path planning and game theory. 9-16 - Marco Cococcioni, Raffaele Grasso, Michel Rixen:
Rapid prototyping of high performance fuzzy computing applications using high level GPU programming for maritime operations support. 17-23
Poster Session
- Julien A. Vijverberg, Cornelis J. Koeleman, Peter H. N. de With:
Clustering of tracklets for on-line multi-target tracking in networked camera systems. 24-30 - Irene Pestov, Marcin L. Pilat:
Modelling Search and Rescue systems with dynamical networks. 31-38 - Ziad Sakr, Slawo Wesolkowski:
Sensor network management using multiobjective evolutionary optimization. 39-42
Radar Based Object Detection and Tracking
- Andrew R. Buck, James M. Keller, Marjorie Skubic, Marcin Detyniecki, Thomas Bärecke:
Object set matching with an evolutionary algorithm. 43-50 - Frédéric Barbaresco:
Computation of most threatening radar trajectories areas and corridors based on fast-marching & Level Sets. 51-58
Tackling Complexity in Defence and Security
- Stéphane Blouin:
Accelerating Common Operational Pictures through network consensus. 65-71 - Daniel Lafond, Michel B. Ducharme:
Complex decision making experimental platform (CODEM): A counter-insurgency scenario. 72-79 - Fanchao Zeng, James Decraene, Malcolm Yoke Hean Low, Wentong Cai, Philip Hingston, Suiping Zhou:
High-dimensional objective-based data farming. 80-87 - Colin Bellinger, Nathalie Japkowicz:
Motivating the inclusion of meteorological indicators in the CTBT feature-space. 88-95 - Daniel T. Wojtaszek, Slawo Wesolkowski:
Multi-objective evolutionary optimization of a military air transportation fleet mix with the flexibility objective. 96-101 - David Galway, Gerard Pieris, Giovanni Fusina:
Tasking system capabilities modeling using the complexity profile. 102-106
Network Security
- Daniel J. Arndt, Nur Zincir-Heywood:
A Comparison of three machine learning techniques for encrypted network traffic analysis. 107-114 - Curtis McCarthy, Nur Zincir-Heywood:
An investigation on identifying SSL traffic. 115-122 - Shengkun Xie, Anna T. Lawniczak:
Detection of stationary network load increase using univariate network aggregate traffic data by dynamic PCA. 123-130
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.