Though recent analysis of traditional cooperative coevolutionary algorithms (CCEAs) casts doubt on their suitability for static optimization tasks, our experience is that the algo...
Abstract. Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into one encrypting the same plaintext for Bob. The proxy only...
Sherman S. M. Chow, Jian Weng, Yanjiang Yang, Robe...
We present Cluster Onset Detection (COD), a novel algorithm to aid in detection of epidemic outbreaks. COD employs unsupervised learning techniques in an online setting to partiti...
In order to assist a power plant operator to face unusual situations, we have developed an intelligent assistant that explains the suggested commands generated by an MDP-based pla...
Francisco Elizalde, Luis Enrique Sucar, Alberto Re...
With the development of highly efficient graph data collection technology in many application fields, classification of graph data emerges as an important topic in the data mining...