Sciweavers

1020 search results - page 55 / 204
» Learning to Use Operational Advice
Sort
View
GECCO
2009
Springer
161views Optimization» more  GECCO 2009»
14 years 4 months ago
Are evolutionary rule learning algorithms appropriate for malware detection?
In this paper, we evaluate the performance of ten well-known evolutionary and non-evolutionary rule learning algorithms. The comparative study is performed on a real-world classiï...
M. Zubair Shafiq, S. Momina Tabish, Muddassar Faro...
HICSS
2006
IEEE
160views Biometrics» more  HICSS 2006»
14 years 4 months ago
Cyber Defense Competitions and Information Security Education: An Active Learning Solution for a Capstone Course
The content of information security curricula spans a wide array of topics. Because of this variety, a program needs to focus on some particular aspect and provide appropriate dep...
Art Conklin
BC
2006
149views more  BC 2006»
13 years 10 months ago
Learning invariant object recognition in the visual system with continuous transformations
Abstract The cerebral cortex utilizes spatiotemporal continuity in the world to help build invariant representations. In vision, these might be representations of objects. The temp...
Simon M. Stringer, G. Perry, Edmund T. Rolls, J. H...
ICANN
2010
Springer
13 years 8 months ago
Autonomous Generation of Internal Representations for Associative Learning
In this contribution, we explore the possibilities of learning in large-scale, multimodal processing systems operating under real-world conditions. Using an instance of a large-sca...
Michaël Garcia Ortiz, Benjamin Dittes, Jannik...
GECCO
2005
Springer
152views Optimization» more  GECCO 2005»
14 years 3 months ago
GAMM: genetic algorithms with meta-models for vision
Recent adaptive image interpretation systems can reach optimal performance for a given domain via machine learning, without human intervention. The policies are learned over an ex...
Greg Lee, Vadim Bulitko