scispace - formally typeset
Search or ask a question
Conference

Foundations of Computational Intelligence 

About: Foundations of Computational Intelligence is an academic conference. The conference publishes majorly in the area(s): Fuzzy logic & The Internet. Over the lifetime, 291 publications have been published by the conference receiving 4711 citations.

Papers published on a yearly basis

Papers
More filters
Book ChapterDOI
01 Jan 2009
TL;DR: This chapter presents a new adaptive variant of BFOA, where the chemotactic step size is adjusted on the run according to the current fitness of a virtual bacterium, and discusses the hybridization of B FOA with other optimization techniques.
Abstract: Bacterial foraging optimization algorithm (BFOA) has been widely accepted as a global optimization algorithm of current interest for distributed optimization and control BFOA is inspired by the social foraging behavior of Escherichia coli BFOA has already drawn the attention of researchers because of its efficiency in solving real-world optimization problems arising in several application domains The underlying biology behind the foraging strategy of Ecoli is emulated in an extraordinary manner and used as a simple optimization algorithm This chapter starts with a lucid outline of the classical BFOA It then analyses the dynamics of the simulated chemotaxis step in BFOA with the help of a simple mathematical model Taking a cue from the analysis, it presents a new adaptive variant of BFOA, where the chemotactic step size is adjusted on the run according to the current fitness of a virtual bacterium Nest, an analysis of the dynamics of reproduction operator in BFOA is also discussed The chapter discusses the hybridization of BFOA with other optimization techniques and also provides an account of most of the significant applications of BFOA until date

421 citations

Proceedings Article
01 Jan 2012
TL;DR: In this paper, this paper investigates how the Great Firewall of China prevents thousands of potential Tor users from accessing the network.
Abstract: Internet censorship in China is not just limited to the web: the Great Firewall of China prevents thousands of potential Tor users from accessing the network. In this paper, we investigate how the ...

208 citations

Proceedings Article
01 Jan 2013
TL;DR: The network topology of the censorship infrastructure in Iran is mapped and it is found that it relies heavily on centralized equipment, a property that might be fruitfully exploited by next generation approaches to censorship circumvention.
Abstract: The Iranian government operates one of the largest and most sophisticated Internet censorship regimes in the world, but the mechanisms it employs have received little research attention, primarily due to lack of access to network connections within the country and personal risks to Iranian citizens who take part. In this paper, we examine the status of Internet censorship in Iran based on network measurements conducted from a major Iranian ISP during the lead up to the June 2013 presidential election. We measure the scope of the censorship by probing Alexa’s top 500 websites in 18 different categories. We investigate the technical mechanisms used for HTTP Host‐based blocking, keyword filtering, DNS hijacking, and protocol-based throttling. Finally, we map the network topology of the censorship infrastructure and find evidence that it relies heavily on centralized equipment, a property that might be fruitfully exploited by next generation approaches to censorship circumvention.

157 citations

Book ChapterDOI
01 Sep 2009
TL;DR: This tutorial presents the most frequently used techniques to deal with multi-label classification problems in a pedagogical manner, with examples illustrating the main techniques and proposing a taxonomy of multi- label techniques that highlights the similarities and differences between these techniques.
Abstract: Most classification problems associate a single class to each example or instance. However, there are many classification tasks where each instance can be associated with one or more classes. This group of problems represents an area known as multi-label classification. One typical example of multi-label classification problems is the classification of documents, where each document can be assigned to more than one class. This tutorial presents the most frequently used techniques to deal with these problems in a pedagogical manner, with examples illustrating the main techniques and proposing a taxonomy of multi-label techniques that highlights the similarities and differences between these techniques.

138 citations

Proceedings Article
01 Jan 2011
TL;DR: Decoy routing is presented, a mechanism capable of circumventing common network filtering strategies by placing the circumvention service in the network itself – where a single device could proxy traffic between a significant fraction of hosts – instead of at the edge.
Abstract: We present decoy routing, a mechanism capable of circumventing common network filtering strategies. Unlike other circumvention techniques, decoy routing does not require a client to connect to a specific IP address (which is easily blocked) in order to provide circumvention. We show that if it is possible for a client to connect to any unblocked host/service, then decoy routing could be used to connect them to a blocked destination without cooperation from the host. This is accomplished by placing the circumvention service in the network itself – where a single device could proxy traffic between a significant fraction of hosts – instead of at the edge.

109 citations

Performance
Metrics
No. of papers from the Conference in previous years
YearPapers
20167
201430
201326
201211
201129
200986