Sciweavers

917 search results - page 144 / 184
» What Context Matters
Sort
View
EC
2008
157views ECommerce» more  EC 2008»
13 years 7 months ago
The Crowding Approach to Niching in Genetic Algorithms
A wide range of niching techniques have been investigated in evolutionary and genetic algorithms. In this article, we focus on niching using crowding techniques in the context of ...
Ole J. Mengshoel, David E. Goldberg
IJCCBS
2010
105views more  IJCCBS 2010»
13 years 7 months ago
Software safety: relating software assurance and software integrity
: The overall safety integrity of a safety critical system, comprising both software and hardware, is typically specified quantitatively, e.g., in terms of failure rates. However, ...
Ibrahim Habli, Richard Hawkins, Tim Kelly
JITECH
2010
117views more  JITECH 2010»
13 years 7 months ago
Understanding information disclosure behaviour in Australian Facebook users
The advent of social networking websites presents further opportunities for criminals to obtain information for use in identity theft, cyber-stalking, and worse activities. This p...
William Newk-Fon Hey Tow, Peter Dell, John Venable
PKDD
2010
Springer
122views Data Mining» more  PKDD 2010»
13 years 7 months ago
Exploration in Relational Worlds
Abstract. One of the key problems in model-based reinforcement learning is balancing exploration and exploitation. Another is learning and acting in large relational domains, in wh...
Tobias Lang, Marc Toussaint, Kristian Kersting
PUC
2010
80views more  PUC 2010»
13 years 7 months ago
Mobile map interactions during a rendezvous: exploring the implications of automation
Abstract Location awareness can help facilitate a rendezvous of two or more persons. To further enhance the rendezvous experience, we conducted two complementary field studies to ...
David Dearman, Kori M. Inkpen, Khai N. Truong