Sciweavers

13224 search results - page 2603 / 2645
» Self-monitoring for Computer Users
Sort
View
GECCO
2003
Springer
132views Optimization» more  GECCO 2003»
14 years 27 days ago
Evolutionary Multimodal Optimization Revisited
Abstract. We revisit a class of multimodal function optimizations using evolutionary algorithms reformulated into a multiobjective framework where previous implementations have nee...
Rajeev Kumar, Peter Rockett
GECCO
2003
Springer
160views Optimization» more  GECCO 2003»
14 years 27 days ago
Using Genetic Algorithms for Data Mining Optimization in an Educational Web-Based System
This paper presents an approach for classifying students in order to predict their final grade based on features extracted from logged data in an education web-based system. A comb...
Behrouz Minaei-Bidgoli, William F. Punch
IDEAL
2003
Springer
14 years 27 days ago
Detecting Distributed Denial of Service (DDoS) Attacks through Inductive Learning
As the complexity of Internet is scaled up, it is likely for the Internet resources to be exposed to Distributed Denial of Service (DDoS) flooding attacks on TCP-based Web servers....
Sanguk Noh, Cheolho Lee, Kyunghee Choi, Gihyun Jun...
CSCW
2010
ACM
14 years 25 days ago
Sending mixed signals: multilevel reputation effects in peer-to-peer lending markets
Online peer-to-peer (P2P) lending organizations enable an individual to obtain an unsecured loan from a collection of individuals without the participation of a bank. Previous res...
Benjamin C. Collier, Robert Hampshire
DATE
2010
IEEE
157views Hardware» more  DATE 2010»
14 years 24 days ago
RMOT: Recursion in model order for task execution time estimation in a software pipeline
Abstract—This paper addresses the problem of execution time estimation for tasks in a software pipeline independent of the application structure or the underlying architecture. A...
Nabeel Iqbal, M. A. Siddique, Jörg Henkel
« Prev « First page 2603 / 2645 Last » Next »