Sciweavers

4229 search results - page 774 / 846
» Modeling Human Intelligence as A Slow Intelligence System
Sort
View
CCIA
2009
Springer
13 years 10 months ago
Shout and Act
1 We adapt the Shout and Act algorithm to Digital Objects Preservation where agents explore file systems looking for digital objects to be preserved (victims). When they find somet...
Josep Lluís de la Rosa, Albert Trias i Mans...
ATAL
2011
Springer
12 years 8 months ago
GUARDS: game theoretic security allocation on a national scale
Building on research previously reported at AAMAS conferences, this paper describes an innovative application of a novel gametheoretic approach for a national scale security deplo...
James Pita, Milind Tambe, Christopher Kiekintveld,...
ISI
2008
Springer
13 years 8 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham
GECCO
2009
Springer
258views Optimization» more  GECCO 2009»
14 years 1 months ago
Evolutionary learning of local descriptor operators for object recognition
Nowadays, object recognition is widely studied under the paradigm of matching local features. This work describes a genetic programming methodology that synthesizes mathematical e...
Cynthia B. Pérez, Gustavo Olague
ECIS
2000
13 years 10 months ago
Enhancing Government Decision Making Through Knowledge Discovery from Data
- A major challenge facing management in developed countries is improving the performance of knowledge and service workers, i.e. the decision makers. In a developing country such a...
Herna L. Viktor, Heidi Arndt, Mauritz Oberholzer