Sciweavers

2006 search results - page 374 / 402
» Heuristic Security-Testing Methods
Sort
View
ATAL
2010
Springer
13 years 10 months ago
Deception in networks of mobile sensing agents
Recent studies have investigated how a team of mobile sensors can cope with real world constraints, such as uncertainty in the reward functions, dynamically appearing and disappea...
Viliam Lisý, Roie Zivan, Katia P. Sycara, M...
GECCO
2008
Springer
152views Optimization» more  GECCO 2008»
13 years 10 months ago
Combatting financial fraud: a coevolutionary anomaly detection approach
A major difficulty for anomaly detection lies in discovering boundaries between normal and anomalous behavior, due to the deficiency of abnormal samples in the training phase. In...
Shelly Xiaonan Wu, Wolfgang Banzhaf
ICML
2010
IEEE
13 years 10 months ago
Large Scale Max-Margin Multi-Label Classification with Priors
We propose a max-margin formulation for the multi-label classification problem where the goal is to tag a data point with a set of pre-specified labels. Given a set of L labels, a...
Bharath Hariharan, Lihi Zelnik-Manor, S. V. N. Vis...
GECCO
2010
Springer
244views Optimization» more  GECCO 2010»
13 years 9 months ago
Implicit fitness and heterogeneous preferences in the genetic algorithm
This paper takes an economic approach to derive an evolutionary learning model based entirely on the endogenous employment of genetic operators in the service of self-interested a...
Justin T. H. Smith
ALMOB
2008
82views more  ALMOB 2008»
13 years 9 months ago
Protein sequence and structure alignments within one framework
Background: Protein structure alignments are usually based on very different techniques to sequence alignments. We propose a method which treats sequence, structure and even combi...
Gundolf Schenk, Thomas Margraf, Andrew E. Torda