Sciweavers

1096 search results - page 161 / 220
» Evaluating Algorithms for Concept Description
Sort
View
134
Voted
ICC
2007
IEEE
164views Communications» more  ICC 2007»
15 years 9 months ago
A Framework of Attacker Centric Cyber Attack Behavior Analysis
—Cyber attack behavior analysis can be roughly classified as “network centric” and “attacker centric” approaches. Compared with traditional “network centric” approach...
Xuena Peng, Hong Zhao
117
Voted
ERCIMDL
2007
Springer
87views Education» more  ERCIMDL 2007»
15 years 9 months ago
Thesaurus-Based Feedback to Support Mixed Search and Browsing Environments
We propose and evaluate a query expansion mechanism that supports searching and browsing in collections of annotated documents. Based on generative language models, our feedback me...
Edgar Meij, Maarten de Rijke
GECCO
2004
Springer
145views Optimization» more  GECCO 2004»
15 years 9 months ago
Automated Extraction of Problem Structure
Most problems studied in artificial intelligence possess some form of structure, but a precise way to define such structure is so far lacking. We investigate how the notion of pr...
Anthony Bucci, Jordan B. Pollack, Edwin D. de Jong
DCOSS
2006
Springer
15 years 7 months ago
Consistency-Based On-line Localization in Sensor Networks
Abstract. We have developed a new on-line error modeling and optimizationbased localization approach for sensor networks in the presence of distance measurement noise. The approach...
Jessica Feng, Lewis Girod, Miodrag Potkonjak
141
Voted
GECCO
2010
Springer
172views Optimization» more  GECCO 2010»
15 years 7 months ago
Investigating the impact of sequential selection in the (1, 2)-CMA-ES on the noiseless BBOB-2010 testbed
This paper investigates the impact of sequential selection, a concept recently introduced for Evolution Strategies (ESs), that consists in performing the evaluations of the diffe...
Anne Auger, Dimo Brockhoff, Nikolaus Hansen