Sciweavers

187 search results - page 11 / 38
» A Rule Set Generation Technique for Better Decision Making
Sort
View
GECCO
2003
Springer
128views Optimization» more  GECCO 2003»
15 years 2 months ago
Cellular Programming and Symmetric Key Cryptography Systems
Abstract. The problem of designing symmetric key cryptography algorithms based upon cellular automata (CAs) is considered. The reliability of the Vernam cipher used in the process ...
Franciszek Seredynski, Pascal Bouvry, Albert Y. Zo...
TMI
1998
97views more  TMI 1998»
14 years 9 months ago
Optimization and FROC Analysis of Rule-Based Detection Schemes Using a Multiobjective Approach
Abstract—Computerized detection schemes have the potential of increasing diagnostic accuracy in medical imaging by alerting radiologists to lesions that they initially overlooked...
Mark A. Anastasio, Matthew A. Kupinski, Robert M. ...
LCPC
2005
Springer
15 years 3 months ago
Analytic Models and Empirical Search: A Hybrid Approach to Code Optimization
Compilers employ system models, sometimes implicitly, to make code optimization decisions. These models are analytic; they reflect their implementor’s understanding and beliefs ...
Arkady Epshteyn, María Jesús Garzar&...
KDD
1997
ACM
159views Data Mining» more  KDD 1997»
15 years 1 months ago
New Algorithms for Fast Discovery of Association Rules
Discovery of association rules is an important problem in database mining. In this paper we present new algorithms for fast association mining, which scan the database only once, ...
Mohammed Javeed Zaki, Srinivasan Parthasarathy, Mi...
AAAI
2011
13 years 9 months ago
Recommendation Sets and Choice Queries: There Is No Exploration/Exploitation Tradeoff!
Utility elicitation is an important component of many applications, such as decision support systems and recommender systems. Such systems query users about their preferences and ...
Paolo Viappiani, Craig Boutilier