Sciweavers

990 search results - page 142 / 198
» Using evolution strategies to solve DEC-POMDP problems
Sort
View
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
14 years 1 months ago
On a Text-Processing Approach to Facilitating Autonomous Deception Detection
Abstract—Current techniques towards information security have limited capabilities to detect and counter attacks that involve different kinds of masquerade and spread of misinfor...
Therani Madhusudan
DKE
2006
126views more  DKE 2006»
13 years 8 months ago
FRACTURE mining: Mining frequently and concurrently mutating structures from historical XML documents
In the past few years, the fast proliferation of available XML documents has stimulated a great deal of interest in discovering hidden and nontrivial knowledge from XML repositori...
Ling Chen 0002, Sourav S. Bhowmick, Liang-Tien Chi...
CEC
2007
IEEE
14 years 2 months ago
Asynchronous spatial evolutionary games: spatial patterns, Diversity and Chaos
— Over the past 50 years, much attention has been given to the Prisoner’s Dilemma as a metaphor for problems surrounding the evolution and maintenance of cooperative and altrui...
David Newth, David Cornforth
ROCAI
2004
Springer
14 years 1 months ago
ROC Optimisation of Safety Related Systems
Abstract. Many safety related and critical systems warn of potentially dangerous events; for example the Short Term Conflict Alert (STCA) system warns of airspace infractions betw...
Jonathan E. Fieldsend, Richard M. Everson
ESANN
2004
13 years 9 months ago
Evolutionary tuning of multiple SVM parameters
The problem of model selection for support vector machines (SVMs) is considered. We propose an evolutionary approach to determine multiple SVM hyperparameters: The covariance matr...
Frauke Friedrichs, Christian Igel