Sciweavers

1805 search results - page 269 / 361
» A Theory of Closure Operators
Sort
View
GECCO
2007
Springer
130views Optimization» more  GECCO 2007»
15 years 10 months ago
Variable discrimination of crossover versus mutation using parameterized modular structure
Recent work has provided functions that can be used to prove a principled distinction between the capabilities of mutation-based and crossover-based algorithms. However, prior fun...
Rob Mills, Richard A. Watson
PKDD
2007
Springer
102views Data Mining» more  PKDD 2007»
15 years 10 months ago
Towards Data Mining Without Information on Knowledge Structure
Most knowledge discovery processes are biased since some part of the knowledge structure must be given before extraction. We propose a framework that avoids this bias by supporting...
Alexandre Vautier, Marie-Odile Cordier, Rene Quini...
SCIA
2007
Springer
111views Image Analysis» more  SCIA 2007»
15 years 10 months ago
Scale-Space Texture Classification Using Combined Classifiers
Abstract. Since texture is scale dependent, multi-scale techniques are quite useful for texture classification. Scale-space theory introduces multi-scale differential operators. In...
Mehrdad J. Gangeh, Bart M. ter Haar Romeny, C. Esw...
WADS
2007
Springer
155views Algorithms» more  WADS 2007»
15 years 10 months ago
Constant Factor Approximations for the Hotlink Assignment Problem
An approach for reducing the navigation effort for the users of a web site is to enhance its hyperlink structure with additional hotlinks. We address the task of adding at most on...
Tobias Jacobs
DASC
2006
IEEE
15 years 10 months ago
On Recognizing Virtual Honeypots and Countermeasures
— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin St...