Sciweavers

GEM
2010
13 years 9 months ago
A Suite of Metaheuristic Algorithms for Static Weapon-Target Allocation
Abstract-- The problem of allocating defensive weapon resources to hostile targets is an optimization problem of high military relevance. The need for obtaining the solutions in re...
Fredrik Johansson, Göran Falkman
FLAIRS
2010
13 years 9 months ago
Using Ontologies in Case-Based Activity Recognition
Pervasive computing requires the ability to detect user activity in order to provide situation-specific services. Case-based reasoning can be used for activity recognition by usin...
Stephen Knox, Lorcan Coyle, Simon Dobson
FLAIRS
2010
13 years 9 months ago
Game Based Training for Fighter Pilots
How could computer games be used to augment training for fighter pilots? This paper is aimed at providing one answer to this research question. Three current methods of training f...
Jeremy Ludwig, Robert Richards, Jeff Lovelace
FLAIRS
2010
13 years 9 months ago
Decision-Theoretic Simulated Annealing
The choice of a good annealing schedule is necessary for good performance of simulated annealing for combinatorial optimization problems. In this paper, we pose the simulated anne...
Todd W. Neller, Christopher J. La Pilla
EVOW
2010
Springer
13 years 9 months ago
Coevolutionary Dynamics of Interacting Species
One of the open questions in evolutionary computation is how an arms race may be initiated between coevolving entities such that the entities acquire new behaviors and increase in ...
Marc Ebner, Richard A. Watson, Jason Alexander
EVOW
2010
Springer
13 years 9 months ago
New Genetic Operators in the Fly Algorithm: Application to Medical PET Image Reconstruction
Abstract. This paper presents an evolutionary approach for image reconstruction in positron emission tomography (PET). Our reconstruction method is based on a cooperative coevoluti...
Franck Patrick Vidal, Jean Louchet, Jean-Marie Roc...
EVOW
2010
Springer
13 years 9 months ago
Evolution of Grim Trigger in Prisoner Dilemma Game with Partial Imitation
The emergence of Grim Trigger as the dominant strategy in the Iterated Prisoner Dilemma (IPD) on a square lattice is investigated for players with finite memory, using three differ...
Degang Wu, Mathis Antony, Kwok Yip Szeto
ECAI
2010
Springer
13 years 9 months ago
LTL Goal Specifications Revisited
The language of linear temporal logic (LTL) has been proposed as a formalism for specifying temporally extended goals and search control constraints in planning. However, the seman...
Andreas Bauer 0002, Patrik Haslum
ECAI
2010
Springer
13 years 9 months ago
Describing the Result of a Classifier to the End-User: Geometric-based Sensitivity
This paper addresses the issue of supporting the end-user of a classifier, when it is used as a decision support system, to classify new cases. We consider several kinds of classif...
Isabelle Alvarez, Sophie Martin, Salma Mesmoudi
ECAI
2010
Springer
13 years 9 months ago
Social Recommendation with Interpersonal Influence
Social recommendation, that an individual recommends an item to another, has gained popularity and success in web applications such as online sharing and shopping services. It is l...
Junming Huang, Xueqi Cheng, Jiafeng Guo, Huawei Sh...