Sciweavers

167 search results - page 28 / 34
» Software Metrics Evaluation Based on Entropy
Sort
View
GECCO
2009
Springer
162views Optimization» more  GECCO 2009»
14 years 3 days ago
On the appropriateness of evolutionary rule learning algorithms for malware detection
In this paper, we evaluate the performance of ten well-known evolutionary and non-evolutionary rule learning algorithms. The comparative study is performed on a real-world classi...
M. Zubair Shafiq, S. Momina Tabish, Muddassar Faro...
CIKM
2009
Springer
14 years 2 months ago
Collaborative filtering using random neighbours in peer-to-peer networks
Traditionally, collaborative filtering (CF) algorithms used for recommendation operate on complete knowledge. This makes these algorithms hard to employ in a decentralized contex...
Arno Bakker, Elth Ogston, Maarten van Steen
IUI
2003
ACM
14 years 23 days ago
Self-adaptive multimodal-interruption interfaces
This work explores the use of ambient displays in the context of interruption. A multimodal interface was created to communicate with users by using two ambient channels for inter...
Ernesto Arroyo, Ted Selker
SAC
2002
ACM
13 years 7 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
GECCO
2010
Springer
172views Optimization» more  GECCO 2010»
14 years 9 days ago
Designing better fitness functions for automated program repair
Evolutionary methods have been used to repair programs automatically, with promising results. However, the fitness function used to achieve these results was based on a few simpl...
Ethan Fast, Claire Le Goues, Stephanie Forrest, We...