Sciweavers

548 search results - page 81 / 110
» Using the Genetic Algorithm to Find Snake-in-the-Box Codes
Sort
View
ICML
2005
IEEE
14 years 8 months ago
Non-negative tensor factorization with applications to statistics and computer vision
We derive algorithms for finding a nonnegative n-dimensional tensor factorization (n-NTF) which includes the non-negative matrix factorization (NMF) as a particular case when n = ...
Amnon Shashua, Tamir Hazan
CEC
2007
IEEE
13 years 11 months ago
Preventing selfish behavior in Ad Hoc networks
Cooperation enforcement is one of the key issues in ad hoc networks. In this paper we proposes a new strategy driven approach that aims at discouraging selfish behavior among netwo...
Marcin Seredynski, Pascal Bouvry, Mieczyslaw A. Kl...
AIIDE
2008
13 years 10 months ago
Stochastic Plan Optimization in Real-Time Strategy Games
We present a domain independent off-line adaptation technique called Stochastic Plan Optimization for finding and improving plans in real-time strategy games. Our method is based ...
Andrew Trusty, Santiago Ontañón, Ash...
GECCO
2006
Springer
179views Optimization» more  GECCO 2006»
13 years 11 months ago
Local search for multiobjective function optimization: pareto descent method
Genetic Algorithm (GA) is known as a potent multiobjective optimization method, and the effectiveness of hybridizing it with local search (LS) has recently been reported in the li...
Ken Harada, Jun Sakuma, Shigenobu Kobayashi
FSE
2009
Springer
136views Cryptology» more  FSE 2009»
14 years 8 months ago
MAC Reforgeability
Message Authentication Codes (MACs) are core algorithms deployed in virtually every security protocol in common usage. In these protocols, the integrity and authenticity of messag...
John Black, Martin Cochran