Sciweavers

313 search results - page 62 / 63
» Complete Local Search with Memory
Sort
View
TELECARE
2004
184views Healthcare» more  TELECARE 2004»
13 years 6 months ago
Securing Mobile Agent Based Tele-Assistance Systems
Nowadays the scientific community is trying to design new techniques in the search for solving security problems in mobile agent technology. There are now some industry initiatives...
Sergio Pozo, Rafael M. Gasca, María Teresa ...
GECCO
2008
Springer
152views Optimization» more  GECCO 2008»
13 years 6 months ago
Combatting financial fraud: a coevolutionary anomaly detection approach
A major difficulty for anomaly detection lies in discovering boundaries between normal and anomalous behavior, due to the deficiency of abnormal samples in the training phase. In...
Shelly Xiaonan Wu, Wolfgang Banzhaf
JAIR
2008
103views more  JAIR 2008»
13 years 5 months ago
SATzilla: Portfolio-based Algorithm Selection for SAT
It has been widely observed that there is no single "dominant" SAT solver; instead, different solvers perform best on different instances. Rather than following the trad...
Lin Xu, Frank Hutter, Holger H. Hoos, Kevin Leyton...
BMCBI
2004
123views more  BMCBI 2004»
13 years 5 months ago
galaxieEST: addressing EST identity through automated phylogenetic analysis
Background: Research involving expressed sequence tags (ESTs) is intricately coupled to the existence of large, well-annotated sequence repositories. Comparatively complete and sa...
R. Henrik Nilsson, Balaji Rajashekar, Karl-Henrik ...
CIKM
2010
Springer
13 years 3 months ago
Multi-view clustering with constraint propagation for learning with an incomplete mapping between views
Multi-view learning algorithms typically assume a complete bipartite mapping between the different views in order to exchange information during the learning process. However, ma...
Eric Eaton, Marie desJardins, Sara Jacob