Sciweavers

5580 search results - page 955 / 1116
» Randomized priority algorithms
Sort
View
CIKM
2007
Springer
14 years 3 months ago
"I know what you did last summer": query logs and user privacy
We investigate the subtle cues to user identity that may be exploited in attacks on the privacy of users in web search query logs. We study the application of simple classifiers ...
Rosie Jones, Ravi Kumar, Bo Pang, Andrew Tomkins
DCOSS
2007
Springer
14 years 3 months ago
Localization for Anchoritic Sensor Networks
We introduce a class of anchoritic sensor networks, where communications between sensor nodes are undesirable or infeasible due to, e.g., harsh environments, energy constraints, or...
Yuliy M. Baryshnikov, Jian Tan
GECCO
2007
Springer
162views Optimization» more  GECCO 2007»
14 years 3 months ago
Learning noise
In this paper we propose a genetic programming approach to learning stochastic models with unsymmetrical noise distributions. Most learning algorithms try to learn from noisy data...
Michael D. Schmidt, Hod Lipson
GECCO
2007
Springer
230views Optimization» more  GECCO 2007»
14 years 3 months ago
Activation energy-based simulation for self-assembly of multi-shape tiles
Building artificial systems using self-assembly is one of the main issues of artificial life [17]. Scientists are trying to understand this process either using experimental appro...
Mostafa Mostafa Hashim Ellabaan
GECCO
2007
Springer
167views Optimization» more  GECCO 2007»
14 years 3 months ago
Evolution of adult male oral tract shapes for close and open vowels
In this paper, we describe an experiment to evolve oral tract (mouth) shapes for a set of vowels for two adult males. Target vowels were recorded in an acoustically anechoic room ...
David M. Howard, Andy M. Tyrrell, Crispin H. V. Co...