Sciweavers

3320 search results - page 491 / 664
» Heuristics for the Phylogeny Problem
Sort
View
AAAI
2008
14 years 22 hour ago
Reinforcement Learning for Vulnerability Assessment in Peer-to-Peer Networks
Proactive assessment of computer-network vulnerability to unknown future attacks is an important but unsolved computer security problem where AI techniques have significant impact...
Scott Dejmal, Alan Fern, Thinh Nguyen
AIPS
2007
14 years 22 hour ago
Robust Local Search and Its Application to Generating Robust Schedules
In this paper, we propose an extended local search framework to solve combinatorial optimization problems with data uncertainty. Our approach represents a major departure from sce...
Hoong Chuin Lau, Thomas Ou, Fei Xiao
WSC
2007
14 years 20 hour ago
Stochastic trust region gradient-free method (strong): a new response-surface-based algorithm in simulation optimization
Response Surface Methodology (RSM) is a metamodelbased optimization method. Its strategy is to explore small subregions of the parameter space in succession instead of attempting ...
Kuo-Hao Chang, L. Jeff Hong, Hong Wan
COMPGEOM
2006
ACM
13 years 11 months ago
On the ICP algorithm
We present upper and lower bounds for the number of iterations performed by the Iterative Closest Point (ICP) algorithm. This algorithm has been proposed by Besl and McKay [4] as ...
Esther Ezra, Micha Sharir, Alon Efrat
DEBS
2008
ACM
13 years 11 months ago
Event dissemination via group-aware stream filtering
We consider a distributed system that disseminates highvolume event streams to many simultaneous monitoring applications over a low-bandwidth network. For bandwidth efficiency, we...
Ming Li, David Kotz