Sciweavers

252 search results - page 48 / 51
» Making Sense of Requirements, Sooner
Sort
View
GECCO
2008
Springer
152views Optimization» more  GECCO 2008»
13 years 10 months ago
Combatting financial fraud: a coevolutionary anomaly detection approach
A major difficulty for anomaly detection lies in discovering boundaries between normal and anomalous behavior, due to the deficiency of abnormal samples in the training phase. In...
Shelly Xiaonan Wu, Wolfgang Banzhaf
MOBICOM
2010
ACM
13 years 9 months ago
Intentional networking: opportunistic exploitation of mobile network diversity
Mobile devices face a diverse and dynamic set of networking options. Using those options to the fullest requires knowledge of application intent. This paper describes Intentional ...
Brett D. Higgins, Azarias Reda, Timur Alperovich, ...
CORR
2008
Springer
105views Education» more  CORR 2008»
13 years 9 months ago
Success Exponent of Wiretapper: A Tradeoff between Secrecy and Reliability
Equivocation has been widely used as a measure of security after Shannon[10]. For an infinite system such as the wiretap channel defined in [2], equivocation is unbounded and so e...
Chung Chan
CORR
2010
Springer
259views Education» more  CORR 2010»
13 years 9 months ago
Community Detection in Networks: The Leader-Follower Algorithm
Natural networks such as those between humans observed through their interactions or biological networks predicted based on various experimental measurements contain a wealth of i...
Devavrat Shah, Tauhid Zaman
AI
2006
Springer
13 years 9 months ago
Complexity of constructing solutions in the core based on synergies among coalitions
Coalition formation is a key problem in automated negotiation among self-interested agents, and other multiagent applications. A coalition of agents can sometimes accomplish thing...
Vincent Conitzer, Tuomas Sandholm