Sciweavers

244 search results - page 13 / 49
» A Linear Search Strategy using Bounds
Sort
View
ATAL
2006
Springer
14 years 11 days ago
Information-theoretic approaches to branching in search
Deciding what to branch on at each node is a key element of search algorithms. We present four families of methods for selecting what question to branch on. They are all informati...
Andrew Gilpin, Tuomas Sandholm
ICASSP
2008
IEEE
14 years 3 months ago
Abnormal event detection based on trajectory clustering by 2-depth greedy search
Clustering-based approaches for abnormal video event detection have been proven to be effective in the recent literature. Based on the framework proposed in our previous work [1],...
Fan Jiang, Ying Wu, Aggelos K. Katsaggelos
CP
2003
Springer
14 years 1 months ago
Using Constraint Programming to Solve the Maximum Clique Problem
This paper aims to show that Constraint Programming can be an efficient technique to solve a well-known combinatorial optimization problem: the search for a maximum clique in a gra...
Jean-Charles Régin
GECCO
2011
Springer
232views Optimization» more  GECCO 2011»
13 years 3 days ago
Mutation rates of the (1+1)-EA on pseudo-boolean functions of bounded epistasis
When the epistasis of the fitness function is bounded by a constant, we show that the expected fitness of an offspring of the (1+1)-EA can be efficiently computed for any point...
Andrew M. Sutton, Darrell Whitley, Adele E. Howe
GECCO
2009
Springer
112views Optimization» more  GECCO 2009»
14 years 3 months ago
Soft memory for stock market analysis using linear and developmental genetic programming
Recently, a form of memory usage was introduced for genetic programming (GP) called “soft memory.” Rather than have a new value completely overwrite the old value in a registe...
Garnett Carl Wilson, Wolfgang Banzhaf