Sciweavers

828 search results - page 133 / 166
» A framework for spyware assessment
Sort
View
ECML
2007
Springer
15 years 8 months ago
Generalization-Based Similarity for Conceptual Clustering
The availability of techniques for comparing descriptions has many applications in Artificial Intelligence, ranging from description selection to flexible matching, from instance...
Stefano Ferilli, Teresa Maria Altomare Basile, Nic...
GECCO
2007
Springer
119views Optimization» more  GECCO 2007»
15 years 8 months ago
Optimising the flow of experiments to a robot scientist with multi-objective evolutionary algorithms
A Robot Scientist is a physically implemented system that applies artificial intelligence to autonomously discover new knowledge through cycles of scientific experimentation. Ad...
Emma Byrne
KES
2007
Springer
15 years 8 months ago
Credal Networks for Operational Risk Measurement and Management
According to widely accepted guidelines for self-regulation, the capital requirements of a bank should relate to the level of risk with respect to three different categories. Amon...
Alessandro Antonucci, Alberto Piatti, Marco Zaffal...
KI
2007
Springer
15 years 8 months ago
From Distributed Vision Networks to Human Behavior Interpretation
Abstract. Analysing human behavior is a key step in smart home applications. Many reasoning approaches utilize information of location and posture of the occupant in qualitative as...
Hamid K. Aghajan, Chen Wu
ASWEC
2006
IEEE
15 years 8 months ago
Evaluating software refactoring tool support
Up to 75% of the costs associated with the development of software systems occur post-deployment during maintenance and evolution. Software refactoring is a process which can sign...
Erica Mealy, Paul A. Strooper