Sciweavers

1029 search results - page 172 / 206
» Compact representations of ordered sets
Sort
View
SASN
2003
ACM
14 years 3 months ago
Modeling vulnerabilities of ad hoc routing protocols
The purpose of this work is to automate the analysis of ad hoc routing protocols in the presence of attackers. To this end, a formal model of protocol behavior is developed in whi...
Shahan Yang, John S. Baras
ATAL
2003
Springer
14 years 3 months ago
Towards a motivation-based approach for evaluating goals
Traditional goal-oriented approaches to building intelligent agents only consider absolute satisfaction of goals. However, in continuous domains there may be many instances in whi...
Stephen J. Munroe, Michael Luck, Mark d'Inverno
CA
2002
IEEE
14 years 2 months ago
Specifying MPEG-4 Body Behaviors
The MPEG-4 standard specifies a set of low-level animation parameters for body animation, but does not provide any high-level functionality for the control of avatars or embodied...
Anthony Guye-Vuillème, Daniel Thalmann
IEEEICCI
2002
IEEE
14 years 2 months ago
Mining Fuzzy Rules in A Donor Database for Direct Marketing by a Charitable Organization
Given a donor database by a charitable organization in Hong Kong, we propose to use a new data mining technique to discover fuzzy rules for direct marketing. The discovered fuzzy ...
Keith C. C. Chan, Wai-Ho Au, Berry Choi
GECCO
2009
Springer
121views Optimization» more  GECCO 2009»
14 years 2 months ago
Using memetic algorithms to improve portfolio performance in static and dynamic trading scenarios
The Portfolio Optimization problem consists of the selection of a group of assets to a long-term fund in order to minimize the risk and maximize the return of the investment. This...
Claus de Castro Aranha, Hitoshi Iba