Sciweavers

373 search results - page 22 / 75
» Covariant Policy Search
Sort
View
GECCO
2005
Springer
145views Optimization» more  GECCO 2005»
14 years 2 months ago
Three dimensional evolutionary aerodynamic design optimization with CMA-ES
In this paper, we present the application of evolutionary optimization methods to a demanding, industrially relevant engineering domain, the three-dimensional optimization of gas ...
Martina Hasenjäger, Bernhard Sendhoff, Toyota...
TRECVID
2008
13 years 10 months ago
Brno University of Technology at TRECVid 2008
In this paper we describe our experiments in all task of TRECVid 2008. This year, we have concentrated mainly on the local (affine covariant) image features and its transformation...
Petr Chmelar, Vítezslav Beran, Adam Herout,...
IEEECIT
2010
IEEE
13 years 7 months ago
Learning Autonomic Security Reconfiguration Policies
Abstract--We explore the idea of applying machine learning techniques to automatically infer risk-adaptive policies to reconfigure a network security architecture when the context ...
Juan E. Tapiador, John A. Clark
CCS
2009
ACM
14 years 9 months ago
Semantic context aware security policy deployment
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Frédéric Cuppens, Joaquín Gar...
ATAL
2003
Springer
14 years 2 months ago
Constructing optimal policies for agents with constrained architectures
Optimal behavior is a very desirable property of autonomous agents and, as such, has received much attention over the years. However, making optimal decisions and executing optima...
Dmitri A. Dolgov, Edmund H. Durfee