Sciweavers

1096 search results - page 161 / 220
» Evaluating Algorithms for Concept Description
Sort
View
ICC
2007
IEEE
164views Communications» more  ICC 2007»
14 years 3 months ago
A Framework of Attacker Centric Cyber Attack Behavior Analysis
—Cyber attack behavior analysis can be roughly classified as “network centric” and “attacker centric” approaches. Compared with traditional “network centric” approach...
Xuena Peng, Hong Zhao
ERCIMDL
2007
Springer
87views Education» more  ERCIMDL 2007»
14 years 2 months ago
Thesaurus-Based Feedback to Support Mixed Search and Browsing Environments
We propose and evaluate a query expansion mechanism that supports searching and browsing in collections of annotated documents. Based on generative language models, our feedback me...
Edgar Meij, Maarten de Rijke
GECCO
2004
Springer
145views Optimization» more  GECCO 2004»
14 years 2 months ago
Automated Extraction of Problem Structure
Most problems studied in artificial intelligence possess some form of structure, but a precise way to define such structure is so far lacking. We investigate how the notion of pr...
Anthony Bucci, Jordan B. Pollack, Edwin D. de Jong
DCOSS
2006
Springer
14 years 10 days ago
Consistency-Based On-line Localization in Sensor Networks
Abstract. We have developed a new on-line error modeling and optimizationbased localization approach for sensor networks in the presence of distance measurement noise. The approach...
Jessica Feng, Lewis Girod, Miodrag Potkonjak
GECCO
2010
Springer
172views Optimization» more  GECCO 2010»
14 years 2 days ago
Investigating the impact of sequential selection in the (1, 2)-CMA-ES on the noiseless BBOB-2010 testbed
This paper investigates the impact of sequential selection, a concept recently introduced for Evolution Strategies (ESs), that consists in performing the evaluations of the diffe...
Anne Auger, Dimo Brockhoff, Nikolaus Hansen