Sciweavers

2391 search results - page 340 / 479
» A Portfolio Approach to Algorithm Selection
Sort
View
CASES
2004
ACM
15 years 8 months ago
A hamming distance based VLIW/EPIC code compression technique
This paper presents and reports on a VLIW code compression technique based on vector Hamming distances [19]. It investigates the appropriate selection of dictionary vectors such t...
Montserrat Ros, Peter Sutton
IUI
2004
ACM
15 years 8 months ago
Evaluating adaptive user profiles for news classification
Never before have so many information sources been available. Most are accessible on-line and some exist on the Internet alone. However, this large information quantity makes inte...
Ricardo Carreira, Jaime M. Crato
GECCO
2010
Springer
172views Optimization» more  GECCO 2010»
15 years 7 months ago
Designing better fitness functions for automated program repair
Evolutionary methods have been used to repair programs automatically, with promising results. However, the fitness function used to achieve these results was based on a few simpl...
Ethan Fast, Claire Le Goues, Stephanie Forrest, We...
CORR
2010
Springer
152views Education» more  CORR 2010»
15 years 3 months ago
Neuroevolutionary optimization
Temporal difference methods are theoretically grounded and empirically effective methods for addressing reinforcement learning problems. In most real-world reinforcement learning ...
Eva Volná
SP
2005
IEEE
156views Security Privacy» more  SP 2005»
15 years 8 months ago
Distributed Detection of Node Replication Attacks in Sensor Networks
The low-cost, off-the-shelf hardware components in unshielded sensor-network nodes leave them vulnerable to compromise. With little effort, an adversary may capture nodes, analyze...
Bryan Parno, Adrian Perrig, Virgil D. Gligor