Sciweavers

1476 search results - page 255 / 296
» Robust constraint-consistent learning
Sort
View
MINENET
2005
ACM
14 years 1 months ago
Learning-based anomaly detection in BGP updates
Detecting anomalous BGP-route advertisements is crucial for improving the security and robustness of the Internet’s interdomain-routing system. In this paper, we propose an inst...
Jian Zhang, Jennifer Rexford, Joan Feigenbaum
COCO
2005
Springer
96views Algorithms» more  COCO 2005»
14 years 1 months ago
A Geometric Approach to Information-Theoretic Private Information Retrieval
A t-private private information retrieval (PIR) scheme allows a user to retrieve the ith bit of an n-bit string x replicated among k servers, while any coalition of up to t server...
David P. Woodruff, Sergey Yekhanin
GECCO
2005
Springer
166views Optimization» more  GECCO 2005»
14 years 1 months ago
The emulation of social institutions as a method of coevolution
This paper offers a novel approach to coevolution based on the sociological theory of symbolic interactionism. It provides a multi-agent computational model along with experimenta...
Deborah Vakas Duong, John J. Grefenstette
GECCO
2005
Springer
102views Optimization» more  GECCO 2005»
14 years 1 months ago
Evolutionary rule-based system for IPO underpricing prediction
Academic literature has documented for a long time the existence of important price gains in the first trading day of initial public offerings (IPOs). Most of the empirical analys...
David Quintana, Cristóbal Luque del Arco-Ca...
GECCO
2005
Springer
139views Optimization» more  GECCO 2005»
14 years 1 months ago
A genetic algorithm for unmanned aerial vehicle routing
Genetic Algorithms (GAs) can efficiently produce high quality results for hard combinatorial real world problems such as the Vehicle Routing Problem (VRP). Genetic Vehicle Represe...
Matthew A. Russell, Gary B. Lamont