Sciweavers

780 search results - page 106 / 156
» A Comparative Analysis of Selection Schemes Used in Genetic ...
Sort
View
DATAMINE
2002
125views more  DATAMINE 2002»
13 years 8 months ago
High-Performance Commercial Data Mining: A Multistrategy Machine Learning Application
We present an application of inductive concept learning and interactive visualization techniques to a large-scale commercial data mining project. This paper focuses on design and c...
William H. Hsu, Michael Welge, Thomas Redman, Davi...
ICIP
2009
IEEE
14 years 10 months ago
Asymmetric 3d/2d Face Recognition Based On Lbp Facial Representation And Canonical Correlation Analysis
In the recent years, 3D Face recognition has emerged as a major solution to deal with the unsolved issues for reliable 2D face recognition, i.e. lighting condition and viewpoint v...
FOGA
1994
13 years 10 months ago
The Schema Theorem and Price's Theorem
Holland's Schema Theorem is widely taken to be the foundation for explanations of the power of genetic algorithms (GAs). Yet some dissent has been expressed as to its implica...
Lee Altenberg
AAAI
2012
11 years 11 months ago
Generalized Sampling and Variance in Counterfactual Regret Minimization
In large extensive form games with imperfect information, Counterfactual Regret Minimization (CFR) is a popular, iterative algorithm for computing approximate Nash equilibria. Whi...
Richard G. Gibson, Marc Lanctot, Neil Burch, Duane...
ICC
2007
IEEE
139views Communications» more  ICC 2007»
14 years 3 months ago
Impatient Backoff Algorithm: Fairness in a Distributed Ad-Hoc MAC
— Many distributed multiple access (MAC) protocols use an exponential backoff mechanism. In that mechanism, a node picks a random backoff time uniformly in an interval that doubl...
Rajarshi Gupta, Jean C. Walrand