Sciweavers

1888 search results - page 323 / 378
» Proof theory and computational analysis
Sort
View
GECCO
2005
Springer
197views Optimization» more  GECCO 2005»
14 years 2 months ago
Performance assessment of an artificial immune system multiobjective optimizer by two improved metrics
In this study, we introduce two improved assessment metrics of multiobjective optimizers, Nondominated Ratio and Spacing Distribution, and analyze their rationality and validity. ...
Maoguo Gong, Licheng Jiao, Haifeng Du, Ronghua Sha...
GECCO
2005
Springer
160views Optimization» more  GECCO 2005»
14 years 2 months ago
On the complexity of hierarchical problem solving
Competent Genetic Algorithms can efficiently address problems in which the linkage between variables is limited to a small order k. Problems with higher order dependencies can onl...
Edwin D. de Jong, Richard A. Watson, Dirk Thierens
KDD
2005
ACM
163views Data Mining» more  KDD 2005»
14 years 2 months ago
Web mining from competitors' websites
This paper presents a framework for user-oriented text mining. It is then illustrated with an example of discovering knowledge from competitors’ websites. The knowledge to be di...
Xin Chen, Yi-fang Brook Wu
MICAI
2005
Springer
14 years 2 months ago
Knowledge and Reasoning Supported by Cognitive Maps
A powerful and useful approach for modeling knowledge and qualitative reasoning is the Cognitive Map. The background of Cognitive Maps is the research about learning environments c...
Alejandro Peña Ayala, Humberto Sossa, Agust...
INFOCOM
2003
IEEE
14 years 1 months ago
Robust Location Detection in Emergency Sensor Networks
— We propose a new framework for providing robust location detection in emergency response systems, based on the theory of identifying codes. The key idea of this approach is to ...
Saikat Ray, Rachanee Ungrangsi, Francesco De Pelle...