Sciweavers

MDAI
2005
Springer
14 years 6 months ago
Language Generation for Conversational Agent by Evolution of Plan Trees with Genetic Programming
As dialogue systems are widely demanded, the research on natural language generation in dialogue has raised interest. Contrary to conventional dialogue systems that reply to the us...
Sungsoo Lim, Sung-Bae Cho
MDAI
2005
Springer
14 years 6 months ago
Regularity Properties of Null-Additive Fuzzy Measure on Metric Spaces
We shall discuss further regularity properties of null-additive fuzzy measure on metric spaces following the previous results. Under the null-additivity condition, some properties ...
Jun Li, Masami Yasuda, Jinjie Song
MDAI
2005
Springer
14 years 6 months ago
Perceptive Evaluation for the Optimal Discounted Reward in Markov Decision Processes
We formulate a fuzzy perceptive model for Markov decision processes with discounted payoff in which the perception for transition probabilities is described by fuzzy sets. Our aim...
Masami Kurano, Masami Yasuda, Jun-ichi Nakagami, Y...
MDAI
2005
Springer
14 years 6 months ago
Cancer Prediction Using Diversity-Based Ensemble Genetic Programming
Combining a set of classifiers has often been exploited to improve the classification performance. Accurate as well as diverse base classifiers are prerequisite to construct a good...
Jin-Hyuk Hong, Sung-Bae Cho
MDAI
2005
Springer
14 years 6 months ago
Meta-data: Characterization of Input Features for Meta-learning
Abstract. Common inductive learning strategies offer the tools for knowledge acquisition, but possess some inherent limitations due to the use of fixed bias during the learning p...
Ciro Castiello, Giovanna Castellano, Anna Maria Fa...
MDAI
2005
Springer
14 years 6 months ago
Noise-Robust Watermarking for Numerical Datasets
Watermarking has been used on multimedia for a variety of applications, among which intellectual property protection stands out. However, and in spite of a growing need, very few a...
Francesc Sebé, Josep Domingo-Ferrer, Agusti...
MDAI
2005
Springer
14 years 6 months ago
One-Way and Two-Party Authenticated ID-Based Key Agreement Protocols Using Pairing
Cryptography is the ancient science of encrypting messages so that only the sender and receiver can recover them. To achieve this goal, an agreed key between the sender and receive...
Takeshi Okamoto, Raylin Tso, Eiji Okamoto
MDAI
2005
Springer
14 years 6 months ago
Cryptosystems Based on Elliptic Curve Pairing
The purpose of this paper is to introduce pairing over elliptic curve and apply it to ID based key agreement schemes and privacy preserving key agreement schemes. The key words her...
Eiji Okamoto, Takeshi Okamoto