Sciweavers

408 search results - page 73 / 82
» Network laws
Sort
View
KDD
2003
ACM
114views Data Mining» more  KDD 2003»
14 years 10 months ago
Information awareness: a prospective technical assessment
Recent proposals to apply data mining systems to problems in law enforcement, national security, and fraud detection have attracted both media attention and technical critiques of...
David Jensen, Matthew J. Rattigan, Hannah Blau
CEC
2008
IEEE
14 years 4 months ago
Automatic model type selection with heterogeneous evolution: An application to RF circuit block modeling
— Many complex, real world phenomena are difficult to study directly using controlled experiments. Instead, the use of computer simulations has become commonplace as a cost effe...
Dirk Gorissen, Luciano De Tommasi, Jeroen Croon, T...
GECCO
2007
Springer
177views Optimization» more  GECCO 2007»
14 years 4 months ago
Evolving virtual creatures revisited
Thirteen years have passed since Karl Sims published his work on evolving virtual creatures. Since then, several novel approaches to neural network evolution and genetic algorithm...
Peter Krcah
SEMWEB
2007
Springer
14 years 4 months ago
Privacy and Capability Management for the European eIDM Framework
The natural evolution of eGovernment is to go beyond the management of identities and therefore it is necessary to manage people, companies or organizations, and their capabilities...
Mario Reyes-Ayala, Ignacio Alamillo, Daniel Chavar...
SAC
2006
ACM
14 years 3 months ago
Evaluating unstructured peer-to-peer lookup overlays
Unstructured peer-to-peer lookup systems incur small constant overhead per single join or leave operation, and can easily support keyword searches. Hence, they are suitable for dy...
Idit Keidar, Roie Melamed