Sciweavers

2071 search results - page 299 / 415
» An Empirical Evaluation of LFG-DOP
Sort
View
108
Voted
DCOSS
2006
Springer
15 years 4 months ago
Agimone: Middleware Support for Seamless Integration of Sensor and IP Networks
The scope of wireless sensor network (WSN) applications has traditionally been restricted by physical sensor coverage and limited computational power. Meanwhile, IP networks like t...
Gregory Hackmann, Chien-Liang Fok, Gruia-Catalin R...
98
Voted
ECBS
2006
IEEE
145views Hardware» more  ECBS 2006»
15 years 4 months ago
The Accuracy of Fault Prediction in Modified Code - Statistical Model vs. Expert Estimation
Fault prediction models still seem to be more popular in academia than in industry. In industry expert estimations of fault proneness are the most popular methods of deciding wher...
Piotr Tomaszewski, Jim Håkansson, Lars Lundb...
ESORICS
2006
Springer
15 years 4 months ago
Privacy-Preserving Queries on Encrypted Data
Data confidentiality is a major concern in database systems. Encryption is a useful tool for protecting the confidentiality of sensitive data. However, when data is encrypted, perf...
Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright
124
Voted
EWCBR
2006
Springer
15 years 4 months ago
Rough Set Feature Selection Algorithms for Textual Case-Based Classification
Feature selection algorithms can reduce the high dimensionality of textual cases and increase case-based task performance. However, conventional algorithms (e.g., information gain)...
Kalyan Moy Gupta, David W. Aha, Philip Moore
GECCO
2006
Springer
133views Optimization» more  GECCO 2006»
15 years 4 months ago
On-line evolutionary computation for reinforcement learning in stochastic domains
In reinforcement learning, an agent interacting with its environment strives to learn a policy that specifies, for each state it may encounter, what action to take. Evolutionary c...
Shimon Whiteson, Peter Stone