Author of the publication

Application of neural networks and genetic algorithms to the screening for high quality chips.

, , , and . Appl. Soft Comput., 9 (2): 824-832 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hotspot-based traceback for mobile ad hoc networks., and . Workshop on Wireless Security, page 43-54. ACM, (2005)Application of neural networks and genetic algorithms to the screening for high quality chips., , , and . Appl. Soft Comput., 9 (2): 824-832 (2009)An Extensible Environment for Evaluating Secure MANET., , and . SecureComm, page 339-352. IEEE, (2005)An optical target to eliminate impinging light in a light scattering simulation., , and . Comput. Phys. Commun., 185 (10): 2504-2509 (2014)Active Mining of Data Streams., , , and . SDM, page 457-461. SIAM, (2004)Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies., , , and . ICDCS, page 478-. IEEE Computer Society, (2003)Decision Tree Evolution Using Limited Number of Labeled Data Items from Drifting Data Streams., , and . ICDM, page 379-382. IEEE Computer Society, (2004)A cooperative intrusion detection system for ad hoc networks., and . SASN, page 135-147. ACM, (2003)Attack Analysis and Detection for Ad Hoc Routing Protocols., and . RAID, volume 3224 of Lecture Notes in Computer Science, page 125-145. Springer, (2004)Intrusion Detection and Response Systems for Mobile Ad Hoc Networks.. Georgia Institute of Technology, Atlanta, GA, USA, (2006)base-search.net (ftgeorgiatech:oai:smartech.gatech.edu:1853/14053).