Sciweavers

4903 search results - page 807 / 981
» The Set Covering Machine
Sort
View
FQAS
2009
Springer
181views Database» more  FQAS 2009»
14 years 4 months ago
Interlingual Information Extraction as a Solution for Multilingual QA Systems
Information extraction systems have been dealt with at length from the viewpoint of users posing definite questions whose expected answer is to be found in a document collection. T...
Jesús Cardeñosa, Carolina Gallardo, ...
GECCO
2009
Springer
166views Optimization» more  GECCO 2009»
14 years 4 months ago
Genetic programming in the wild: evolving unrestricted bytecode
We describe a methodology for evolving Java bytecode, enabling the evolution of extant, unrestricted Java programs, or programs in other languages that compile to Java bytecode. B...
Michael Orlov, Moshe Sipper
GECCO
2009
Springer
161views Optimization» more  GECCO 2009»
14 years 4 months ago
Are evolutionary rule learning algorithms appropriate for malware detection?
In this paper, we evaluate the performance of ten well-known evolutionary and non-evolutionary rule learning algorithms. The comparative study is performed on a real-world classi...
M. Zubair Shafiq, S. Momina Tabish, Muddassar Faro...
ICTAC
2009
Springer
14 years 4 months ago
Input-Output Model Programs
Abstract. Model programs are used as high-level behavioral specifications typically representing abstract state machines. For modeling reactive systems, one uses input-output mode...
Margus Veanes, Nikolaj Bjørner
IDEAL
2009
Springer
14 years 4 months ago
STORM - A Novel Information Fusion and Cluster Interpretation Technique
Abstract. Analysis of data without labels is commonly subject to scrutiny by unsupervised machine learning techniques. Such techniques provide more meaningful representations, usef...
Jan Feyereisl, Uwe Aickelin