Sciweavers

1171 search results - page 19 / 235
» Multisource Algorithmic Information Theory
Sort
View
JAISE
2010
192views Algorithms» more  JAISE 2010»
13 years 2 months ago
Activity recognition using temporal evidence theory
The ability to identify the behavior of people in a home is at the core of Smart Home functionality. Such environments are equipped with sensors that unobtrusively capture informat...
Susan McKeever, Juan Ye, Lorcan Coyle, Chris Bleak...
CCS
2011
ACM
12 years 7 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
ENTCS
2008
89views more  ENTCS 2008»
13 years 8 months ago
CC(X): Semantic Combination of Congruence Closure with Solvable Theories
We present a generic congruence closure algorithm for deciding ground formulas in the combination of the theory of equality with uninterpreted symbols and an arbitrary built-in so...
Sylvain Conchon, Evelyne Contejean, Johannes Kanig...
GECCO
2006
Springer
162views Optimization» more  GECCO 2006»
13 years 11 months ago
Indirect co-evolution for understanding belief in an incomplete information dynamic game
This study aims to design a new co-evolution algorithm, Mixture Co-evolution which enables modeling of integration and composition of direct co-evolution and indirect coevolution....
Nanlin Jin
ACMICEC
2007
ACM
102views ECommerce» more  ACMICEC 2007»
13 years 12 months ago
Learning to trade with insider information
This paper introduces algorithms for learning how to trade using insider (superior) information in Kyle's model of financial markets. Prior results in finance theory relied o...
Sanmay Das