Sciweavers

9949 search results - page 1854 / 1990
» On the Network Complexity of Selection
Sort
View
AIPS
2009
13 years 11 months ago
Learning User Plan Preferences Obfuscated by Feasibility Constraints
It has long been recognized that users can have complex preferences on plans. Non-intrusive learning of such preferences by observing the plans executed by the user is an attracti...
Nan Li, William Cushing, Subbarao Kambhampati, Sun...
CEC
2010
IEEE
13 years 11 months ago
Multi-objective memetic evolution of ART-based classifiers
In this paper we present a novel framework for evolving ART-based classification models, which we refer to as MOME-ART. The new training framework aims to evolve populations of ART...
Rong Li, Timothy R. Mersch, Oriana X. Wen, Assem K...
GISCIENCE
2010
Springer
212views GIS» more  GISCIENCE 2010»
13 years 11 months ago
Qualitative Change to 3-Valued Regions
Regions which evolve over time are a significant aspect of many phenomena in geographic information science. Examples include areas in which a measured value (e.g. temperature, sal...
Matt Duckham, John G. Stell, Maria Vasardani, Mich...
DAIS
2009
13 years 11 months ago
Fault-Tolerant Aggregation by Flow Updating
Data aggregation plays an important role in the design of scalable systems, allowing the determination of meaningful system-wide properties to direct the execution of distributed a...
Paulo Jesus, Carlos Baquero, Paulo Sérgio A...
DBSEC
2009
122views Database» more  DBSEC 2009»
13 years 11 months ago
An Approach to Security Policy Configuration Using Semantic Threat Graphs
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding a...
Simon N. Foley, William M. Fitzgerald
« Prev « First page 1854 / 1990 Last » Next »