Sciweavers

11488 search results - page 19 / 2298
» Robust optimization - methodology and applications
Sort
View
NECO
2008
122views more  NECO 2008»
13 years 7 months ago
Constrained Subspace ICA Based on Mutual Information Optimization Directly
We introduce a new approach to constrained Independent Component Analysis (ICA) by formulating the original, unconstrained ICA problem as well as the constraints in mutual informa...
Marc M. Van Hulle
GECCO
2007
Springer
269views Optimization» more  GECCO 2007»
14 years 1 months ago
Automated red teaming: a proposed framework for military application
In this paper, we describe Automated Red Teaming (ART), a concept that uses Evolutionary Algorithm (EA), Parallel Computing and Simulation to complement the manual Red Teaming eff...
Chwee Seng Choo, Ching Lian Chua, Su-Han Victor Ta...
CSREASAM
2006
13 years 9 months ago
Application of Gaussian Estimation for Devising Reliable Vulnerability Assessment on SIP-based VoIP Infrastructure
The Session Initiation Protocol (SIP) is an application-layer protocol commonly used in VoIP for communication over the Internet. In this paper we describe a method to assess a pa...
Mohammad Chowdhury, Bon Sy, Rasheed Ahmad
ICML
2006
IEEE
14 years 8 months ago
Nightmare at test time: robust learning by feature deletion
When constructing a classifier from labeled data, it is important not to assign too much weight to any single input feature, in order to increase the robustness of the classifier....
Amir Globerson, Sam T. Roweis
ECSQARU
2005
Springer
14 years 1 months ago
Generating Fuzzy Models from Deep Knowledge: Robustness and Interpretability Issues
The most problematic and challenging issues in fuzzy modeling of nonlinear system dynamics deal with robustness and interpretability. Traditional data-driven approaches, especially...
Raffaella Guglielmann, Liliana Ironi