0000000000535245

AUTHOR

Juan J. Merelo

showing 2 related works from this author

Increasing GP Computing Power for Free via Desktop GRID Computing and Virtualization

2009

This paper presents how it is possible to increase the Genetic Programming (GP) Computing Power (CP) for free, via Volunteer Computing (VC), using the well known framework BOINC plus a new ``virtualization'' layer which adds all the benefits from the virtualization paradigm. Two different experiments, employing a standard GP tool and a complex GP system, are performed --with distributed PCs over several cities-- to show the free achieved CP by means of VC, without the necessity of modifying or adapting the original GP source code. The methodology can be easily extended to Evolutionary Algorithms (EAs).

Source codebusiness.industryComputer sciencemedia_common.quotation_subjectEvolutionary algorithmGenetic programmingcomputer.software_genreVirtualizationMultiplexingSoftwareGrid computingMiddleware (distributed applications)Operating systembusinesscomputermedia_common2009 17th Euromicro International Conference on Parallel, Distributed and Network-based Processing
researchProduct

An Improved Decision System for URL Accesses Based on a Rough Feature Selection Technique

2015

Corporate security is usually one of the matters in which companies invest more resources, since the loss of information directly translates into monetary losses. Security issues might have an origin in external attacks or internal security failures, but an important part of the security breaches is related to the lack of awareness that the employees have with regard to the use of the Web. In this work we have focused on the latter problem, describing the improvements to a system able to detect anomalous and potentially insecure situations that could be dangerous for a company. This system was initially conceived as a better alternative to what are known as black/white lists. These lists co…

Information retrievalInternal securityComputer scienceDecision systemFeature (computer vision)String (computer science)Computational intelligenceFeature selectionRough setCorporate security
researchProduct