Sciweavers

12993 search results - page 2529 / 2599
» Artificial Intelligence in China
Sort
View
ECSQARU
2009
Springer
14 years 3 months ago
Encompassing Attacks to Attacks in Abstract Argumentation Frameworks
sing Attacks to Attacks in Abstract Argumentation Frameworks Pietro Baroni, Federico Cerutti, Massimiliano Giacomin, and Giovanni Guida Dipartimento di Elettronica per lā€™Automazi...
Pietro Baroni, Federico Cerutti, Massimiliano Giac...
GECCO
2009
Springer
254views Optimization» more  GECCO 2009»
14 years 3 months ago
Agglomerative genetic algorithm for clustering in social networks
Size and complexity of data repositories collaboratively created by Web users generate a need for new processing approaches. In this paper, we study the problem of detection of ļ¬...
Marek Lipczak, Evangelos E. Milios
GECCO
2009
Springer
152views Optimization» more  GECCO 2009»
14 years 3 months ago
Application of evolutionary algorithms in detection of SIP based flooding attacks
The Session Initiation Protocol (SIP) is the de facto standard for userā€™s session control in the next generation Voice over Internet Protocol (VoIP) networks based on the IP Mul...
M. Ali Akbar, Muddassar Farooq
GECCO
2009
Springer
14 years 3 months ago
Dynamic evolutionary optimisation: an analysis of frequency and magnitude of change
In this paper, we rigorously analyse how the magnitude and frequency of change may affect the performance of the algorithm (1+1) EAdyn on a set of artiļ¬cially designed pseudo-Bo...
Philipp Rohlfshagen, Per Kristian Lehre, Xin Yao
GECCO
2009
Springer
132views Optimization» more  GECCO 2009»
14 years 3 months ago
Bringing evolutionary computation to industrial applications with guide
Evolutionary Computation is an exciting research ļ¬eld with the power to assist researchers in the task of solving hard optimization problems (i.e., problems where the exploitabl...
Luís Da Costa, Marc Schoenauer
« Prev « First page 2529 / 2599 Last » Next »