نتایج جستجو برای: Exploitations
تعداد نتایج: 442 فیلتر نتایج به سال:
During any meta-heuristic search, two opposite processes are found in action, namely the explorations and exploitations. Although they might seem to operate in opposite directions, they are actually counterparts, and synergy between them may improve the final outcome of the algorithm. This is especially true for complex, high dimensional problems, because the search algorithm has to avoid many ...
We have conducted an empirical study of a number of computer security exploits and determined that the rates at which incidents involving the exploit are reported to the CERT can be modeled using a common mathematical framework. Data associated with three significant exploits involving vulnerabilities in phf, imap, and bind can all be modeled using the formula C = I + S pM where C is the cumula...
We present a method for detecting exploitations of vul-nerabilities in privileged programs by monitoring their execution using audit trials, where the monitoring is with respect to speciications of the security-relevant behavior of the programs. Our work is motivated by the intrusion detection paradigm, but is an attempt to avoid ad hoc approaches to codifying misuse behavior. Our approach is b...
A proper balance between global explorations and local exploitations is often considered necessary for complex, high dimensional optimization problems to avoid local optima and to find a good near optimum solution with sufficient convergence speed. This paper introduces Artificial Bee Colony algorithm with Adaptive eXplorations and eXploitations (ABC-AX), a novel algorithm that improves over th...
abstract. over the past decades, range managers have devoted extensive efforts to conserve and restore rangelands and sustain their exploitation but these efforts are more focused on the classic sciences and the exploiters' knowledge and experience have been neglected in the process. therefore, current study was done to deal with the prioritizing and comparing factors affecting rangeland exploi...
This paper proposes and demonstrates an RFIDover-Fiber wireless track and trace system using active RFID tags and operating over distances up to 30 km of optical fiber and 35 meters of wireless readability. Keywords—component; microwave photonics, radio-over-fiber,
How vulnerable are unprotected machines on the Internet? Utilizing Amazon’s Elastic Compute Cloud (EC2) service and our own VMware ESXi server, we launched and monitored 18 Windows machines (Windows 2008, XP and 7) without anti-virus or firewall protection at two distinct locations on the Internet—in the cloud and on-premise. Some machines ran a wide-open configuration with all ports open and s...
This descriptive analytical survey was aimed to study the negative impacts of mine exploitations carried out in the rural regions of the Tekab Township located in Iran. The statistical population of the studied areas consisted of all the heads of the rural households in the villages located in the vicinity of the mines in the Tekab Township (N=2680). According to the Cochran formula, a sample s...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید