Sciweavers

24529 search results - page 4842 / 4906
» Computing on Authenticated Data
Sort
View
GECCO
2008
Springer
145views Optimization» more  GECCO 2008»
13 years 11 months ago
Memory with memory: soft assignment in genetic programming
Based in part on observations about the incremental nature of most state changes in biological systems, we introduce the idea of Memory with Memory in Genetic Programming (GP), wh...
Nicholas Freitag McPhee, Riccardo Poli
GECCO
2008
Springer
121views Optimization» more  GECCO 2008»
13 years 11 months ago
Fast rule representation for continuous attributes in genetics-based machine learning
Genetic-Based Machine Learning Systems (GBML) are comparable in accuracy with other learning methods. However, efficiency is a significant drawback. This paper presents a new rep...
Jaume Bacardit, Natalio Krasnogor
ICFP
2010
ACM
13 years 11 months ago
Bidirectionalizing graph transformations
Bidirectional transformations provide a novel mechanism for synchronizing and maintaining the consistency of information between input and output. Despite many promising results o...
Soichiro Hidaka, Zhenjiang Hu, Kazuhiro Inaba, Hir...
ICFP
2010
ACM
13 years 11 months ago
Distance makes the types grow stronger: a calculus for differential privacy
We want assurances that sensitive information will not be disclosed when aggregate data derived from a database is published. Differential privacy offers a strong statistical guar...
Jason Reed, Benjamin C. Pierce
MM
2010
ACM
185views Multimedia» more  MM 2010»
13 years 10 months ago
The virtual chocolate factory: mixed reality industrial collaboration and control
We show several aspects of a complex mixed reality system that we have built and deployed in a real-world factory setting. In our system, virtual worlds, augmented realities, and ...
Maribeth Back, Don Kimber, Eleanor G. Rieffel, Ant...
« Prev « First page 4842 / 4906 Last » Next »