Sciweavers

143 search results - page 19 / 29
» Revisiting Negative Selection Algorithms
Sort
View
CIKM
2009
Springer
14 years 2 months ago
Vetting the links of the web
Many web links mislead human surfers and automated crawlers because they point to changed content, out-of-date information, or invalid URLs. It is a particular problem for large, ...
Na Dai, Brian D. Davison
GECCO
2009
Springer
103views Optimization» more  GECCO 2009»
14 years 2 months ago
Why evolution is not a good paradigm for program induction: a critique of genetic programming
We revisit the roots of Genetic Programming (i.e. Natural Evolution), and conclude that the mechanisms of the process of evolution (i.e. selection, inheritance and variation) are ...
John R. Woodward, Ruibin Bai
ICDM
2009
IEEE
137views Data Mining» more  ICDM 2009»
14 years 2 months ago
Set-Based Boosting for Instance-Level Transfer
—The success of transfer to improve learning on a target task is highly dependent on the selected source data. Instance-based transfer methods reuse data from the source tasks to...
Eric Eaton, Marie desJardins
GECCO
2008
Springer
129views Optimization» more  GECCO 2008»
13 years 8 months ago
Exploiting the path of least resistance in evolution
Hereditary Repulsion (HR) is a selection method coupled with a fitness constraint that substantially improves the performance and consistency of evolutionary algorithms. This als...
Gearoid Murphy, Conor Ryan
CORR
2010
Springer
143views Education» more  CORR 2010»
13 years 7 months ago
Dendritic Cells for Anomaly Detection
Artificial immune systems, more specifically the negative selection algorithm, have previously been applied to intrusion detection. The aim of this research is to develop an intrus...
Julie Greensmith, Jamie Twycross, Uwe Aickelin