


default search action
CISDA 2011: Paris, France
- 2011 IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2011, Paris, France, April 15, 2011. IEEE 2011, ISBN 978-1-4244-9941-0

Computational Intelligence in Support of Maritime Operations
- Chris Thornton, Tom Flanagan, Jörg Denzinger

, Jeffrey E. Boyd:
Evaluating goal ordering structures for testing harbour security policies. 1-8 - Christopher Strode:

Optimising multistatic sensor locations using path planning and game theory. 9-16 - Marco Cococcioni

, Raffaele Grasso
, Michel Rixen:
Rapid prototyping of high performance fuzzy computing applications using high level GPU programming for maritime operations support. 17-23
Poster Session
- Julien A. Vijverberg, Cornelis J. Koeleman, Peter H. N. de With:

Clustering of tracklets for on-line multi-target tracking in networked camera systems. 24-30 - Irene Pestov, Marcin L. Pilat:

Modelling Search and Rescue systems with dynamical networks. 31-38 - Ziad Sakr, Slawo Wesolkowski:

Sensor network management using multiobjective evolutionary optimization. 39-42
Radar Based Object Detection and Tracking
- Andrew R. Buck, James M. Keller, Marjorie Skubic, Marcin Detyniecki, Thomas Bärecke:

Object set matching with an evolutionary algorithm. 43-50 - Frédéric Barbaresco:

Computation of most threatening radar trajectories areas and corridors based on fast-marching & Level Sets. 51-58
Tackling Complexity in Defence and Security
- Stéphane Blouin:

Accelerating Common Operational Pictures through network consensus. 65-71 - Daniel Lafond, Michel B. Ducharme:

Complex decision making experimental platform (CODEM): A counter-insurgency scenario. 72-79 - Fanchao Zeng, James Decraene, Malcolm Yoke Hean Low

, Wentong Cai
, Philip Hingston, Suiping Zhou:
High-dimensional objective-based data farming. 80-87 - Colin Bellinger, Nathalie Japkowicz

:
Motivating the inclusion of meteorological indicators in the CTBT feature-space. 88-95 - Daniel T. Wojtaszek, Slawo Wesolkowski:

Multi-objective evolutionary optimization of a military air transportation fleet mix with the flexibility objective. 96-101 - David Galway, Gerard Pieris, Giovanni Fusina:

Tasking system capabilities modeling using the complexity profile. 102-106
Network Security
- Daniel J. Arndt, Nur Zincir-Heywood

:
A Comparison of three machine learning techniques for encrypted network traffic analysis. 107-114 - Curtis McCarthy, Nur Zincir-Heywood

:
An investigation on identifying SSL traffic. 115-122 - Shengkun Xie

, Anna T. Lawniczak
:
Detection of stationary network load increase using univariate network aggregate traffic data by dynamic PCA. 123-130

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














