Sciweavers

1084 search results - page 166 / 217
» Optimal worm-scanning method using vulnerable-host distribut...
Sort
View
GECCO
2006
Springer
167views Optimization» more  GECCO 2006»
14 years 19 days ago
Estimating the destructiveness of crossover on binary tree representations
In some cases, evolutionary algorithms represent individuals as typical binary trees with n leaves and n-1 internal nodes. When designing a crossover operator for a particular rep...
Luke Sheneman, James A. Foster
GECCO
2008
Springer
149views Optimization» more  GECCO 2008»
13 years 10 months ago
Real-time imitation-based adaptation of gaming behaviour in modern computer games
In the course of the recent complexification and sophistication of commercial computer games, the creation of competitive artificial players that are able to behave intelligentl...
Steffen Priesterjahn, Alexander Weimer, Markus Ebe...
GECCO
2008
Springer
128views Optimization» more  GECCO 2008»
13 years 10 months ago
Multi-agent task allocation: learning when to say no
This paper presents a communication-less multi-agent task allocation procedure that allows agents to use past experience to make non-greedy decisions about task assignments. Exper...
Adam Campbell, Annie S. Wu, Randall Shumaker
ICIP
2007
IEEE
13 years 9 months ago
ML Nonlinear Smoothing for Image Segmentation and its Relationship to the Mean Shift
This paper addresses the issues of nonlinear edge-preserving image smoothing and segmentation. A ML-based approach is proposed which uses an iterative algorithm to solve the probl...
Andy Backhouse, Irene Y. H. Gu, Tiesheng Wang
STACS
2007
Springer
14 years 3 months ago
Broadcasting vs. Mixing and Information Dissemination on Cayley Graphs
One frequently studied problem in the context of information dissemination in communication networks is the broadcasting problem. In this paper, we study the following randomized b...
Robert Elsässer, Thomas Sauerwald