Sciweavers

2444 search results - page 372 / 489
» Feature Construction for Back-Propagation
Sort
View
CCS
2006
ACM
15 years 8 months ago
Secure information flow with random assignment and encryption
Type systems for secure information flow aim to prevent a program from leaking information from variables classified as H to variables classified as L. In this work we extend such...
Geoffrey Smith
ECOOP
2006
Springer
15 years 8 months ago
Responders: Language Support for Interactive Applications
A variety of application domains are interactive in nature: a primary task involves responding to external actions. In this paper, we introduce explicit programming language suppor...
Brian Chin, Todd D. Millstein
EMO
2006
Springer
158views Optimization» more  EMO 2006»
15 years 8 months ago
The Hypervolume Indicator Revisited: On the Design of Pareto-compliant Indicators Via Weighted Integration
The design of quality measures for approximations of the Pareto-optimal set is of high importance not only for the performance assessment, but also for the construction of multiobj...
Eckart Zitzler, Dimo Brockhoff, Lothar Thiele
FATES
2006
Springer
15 years 8 months ago
Model-Based Testing of Thin-Client Web Applications
Abstract. More and more software systems use a browser as the universal graphical user interface. As a consequence these applications inherit browser navigation as part of their in...
Pieter W. M. Koopman, Rinus Plasmeijer, Peter Acht...
GECCO
2006
Springer
218views Optimization» more  GECCO 2006»
15 years 8 months ago
Genetic programming with primitive recursion
When Genetic Programming is used to evolve arithmetic functions it often operates by composing them from a fixed collection of elementary operators and applying them to parameters...
Stefan Kahrs