Sciweavers

2526 search results - page 369 / 506
» A Comparative Evaluation of Name-Matching Algorithms
Sort
View
AAAI
2008
15 years 6 months ago
Reinforcement Learning for Vulnerability Assessment in Peer-to-Peer Networks
Proactive assessment of computer-network vulnerability to unknown future attacks is an important but unsolved computer security problem where AI techniques have significant impact...
Scott Dejmal, Alan Fern, Thinh Nguyen
CIMCA
2005
IEEE
15 years 5 months ago
Fuzzy System Modeling with the Genetic and Differential Evolutionary Optimization
This paper compares the performance of two provably successful evolutionary optimization tools in the optimization of a Fuzzy-Rule-Base (FRB) for the three well known fuzzy modeli...
Mehmet Bodur, Adnan Acan, Talip Akyol
ICONIP
2008
15 years 5 months ago
Time Series Analysis for Long Term Prediction of Human Movement Trajectories
This paper's intention is to adapt prediction algorithms well known in the field of time series analysis to problems being faced in the field of mobile robotics and Human-Robo...
Sven Hellbach, Julian Eggert, Edgar Körner, H...
LREC
2008
99views Education» more  LREC 2008»
15 years 5 months ago
Characterization of Scientific and Popular Science Discourse in French, Japanese and Russian
We aim to characterize the comparability of corpora, we address this issue in the trilingual context through the distinction of expert and non expert documents. We work separately...
Lorraine Goeuriot, Natalia Grabar, Béatrice...
AAAI
2006
15 years 5 months ago
Cost-Sensitive Test Strategies
In medical diagnosis doctors must often determine what medical tests (e.g., X-ray, blood tests) should be ordered for a patient to minimize the total cost of medical tests and mis...
Shengli Sheng, Charles X. Ling, Ailing Ni, Shichao...