Sciweavers

2391 search results - page 408 / 479
» A Portfolio Approach to Algorithm Selection
Sort
View
ICEC
1994
37views more  ICEC 1994»
14 years 11 months ago
A Method for Utilizing Diploid/Dominance in Genetic Search
homologous alleles seemingly compete prior to manifestation in the observed phenotype, will be referred to as sub-phenotype interaction.A method is proposed for implementing diploi...
F. Greene
CEC
2010
IEEE
14 years 11 months ago
A mixed strategy for Evolutionary Programming based on local fitness landscape
The performance of Evolutionary Programming (EP) is affected by many factors (e.g. mutation operators and selection strategies). Although the conventional approach with Gaussian mu...
Liang Shen, Jun He
CIDM
2007
IEEE
14 years 10 months ago
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining
— Detecting unknown worms is a challenging task. Extant solutions, such as anti-virus tools, rely mainly on prior explicit knowledge of specific worm signatures. As a result, aft...
Robert Moskovitch, Ido Gus, Shay Pluderman, Dima S...
CGF
2008
144views more  CGF 2008»
14 years 10 months ago
Deformation-Driven Shape Correspondence
Non-rigid 3D shape correspondence is a fundamental and difficult problem. Most applications which require a correspondence rely on manually selected markers. Without user assistan...
Hao Zhang 0002, Alla Sheffer, Daniel Cohen-Or, Qua...
ESWA
2008
155views more  ESWA 2008»
14 years 10 months ago
Using GHSOM to construct legal maps for Taiwan's securities and futures markets
A good legal knowledge representation system, capable of effectively providing investors with comprehensive legal knowledge, is needed for investors to prevent erratic behavior be...
Jen-Ying Shih, Yu-Jung Chang, Wun-Hwa Chen