Sciweavers

1207 search results - page 165 / 242
» Towards optimal k-anonymization
Sort
View
FDTC
2006
Springer
74views Cryptology» more  FDTC 2006»
14 years 1 months ago
Fault Attack Resistant Cryptographic Hardware with Uniform Error Detection
Traditional hardware error detection methods based on linear codes make assumptions about the typical or expected errors and faults and concentrate the detection power towards the ...
Konrad J. Kulikowski, Mark G. Karpovsky, Alexander...
GECCO
2006
Springer
205views Optimization» more  GECCO 2006»
14 years 1 months ago
Bounding XCS's parameters for unbalanced datasets
This paper analyzes the behavior of the XCS classifier system on imbalanced datasets. We show that XCS with standard parameter settings is quite robust to considerable class imbal...
Albert Orriols-Puig, Ester Bernadó-Mansilla
AAAI
2007
13 years 12 months ago
Acquiring Visibly Intelligent Behavior with Example-Guided Neuroevolution
Much of artificial intelligence research is focused on devising optimal solutions for challenging and well-defined but highly constrained problems. However, as we begin creating...
Bobby D. Bryant, Risto Miikkulainen
AIPS
2008
13 years 12 months ago
Multiagent Planning Under Uncertainty with Stochastic Communication Delays
We consider the problem of cooperative multiagent planning under uncertainty, formalized as a decentralized partially observable Markov decision process (Dec-POMDP). Unfortunately...
Matthijs T. J. Spaan, Frans A. Oliehoek, Nikos A. ...
GECCO
2007
Springer
192views Optimization» more  GECCO 2007»
13 years 11 months ago
Parsimonious regularization using genetic algorithms applied to the analysis of analytical ultracentrifugation experiments
Frequently in the physical sciences experimental data are analyzed to determine model parameters using techniques known as parameter estimation. Eliminating the effects of noise ...
Emre H. Brookes, Borries Demeler