Sciweavers

2006 search results - page 343 / 402
» Heuristic Security-Testing Methods
Sort
View
NECO
2008
108views more  NECO 2008»
13 years 9 months ago
An SMO Algorithm for the Potential Support Vector Machine
We describe a fast Sequential Minimal Optimization (SMO) procedure for solving the dual optimization problem of the recently proposed Potential Support Vector Machine (P-SVM). The...
Tilman Knebel, Sepp Hochreiter, Klaus Obermayer
NN
2008
Springer
158views Neural Networks» more  NN 2008»
13 years 9 months ago
Optimal wide-area monitoring and nonlinear adaptive coordinating neurocontrol of a power system with wind power integration and
Wide-area coordinating control is becoming an important issue and a challenging problem in the power industry. This paper proposes a novel optimal wide-area coordinating neurocont...
Wei Qiao, Ganesh K. Venayagamoorthy, Ronald G. Har...
PR
2008
131views more  PR 2008»
13 years 9 months ago
A memetic algorithm for evolutionary prototype selection: A scaling up approach
Prototype selection problem consists of reducing the size of databases by removing samples that are considered noisy or not influential on nearest neighbour classification tasks. ...
Salvador García, José Ramón C...
AAI
2005
117views more  AAI 2005»
13 years 9 months ago
Machine Learning in Hybrid Hierarchical and Partial-Order Planners for Manufacturing Domains
The application of AI planning techniques to manufacturing systems is being widely deployed for all the tasks involved in the process, from product design to production planning an...
Susana Fernández, Ricardo Aler, Daniel Borr...
TCSV
2008
105views more  TCSV 2008»
13 years 9 months ago
Combination Load Balancing for Video-on-Demand Systems
We observe that an effect of "disk resource sharing" of multi-copy movie traffic has great impact on the blocking performance of a video-on-demand system. This observatio...
Jun Guo, Eric Wing Ming Wong, Sammy Chan, Peter Ta...