Sciweavers

1149 search results - page 113 / 230
» Comparing parameter tuning methods for evolutionary algorith...
Sort
View
SIGMOD
1993
ACM
163views Database» more  SIGMOD 1993»
15 years 7 months ago
The LRU-K Page Replacement Algorithm For Database Disk Buffering
This paper introduces a new approach to database disk buffering, called the LRU–K method. The basic idea of LRU–K is to keep track of the times of the last K references to pop...
Elizabeth J. O'Neil, Patrick E. O'Neil, Gerhard We...
BMCBI
2004
158views more  BMCBI 2004»
15 years 2 months ago
A novel Mixture Model Method for identification of differentially expressed genes from DNA microarray data
Background: The main goal in analyzing microarray data is to determine the genes that are differentially expressed across two types of tissue samples or samples obtained under two...
Kayvan Najarian, Maryam Zaheri, Ali Ajdari Rad, Si...
GECCO
2008
Springer
139views Optimization» more  GECCO 2008»
15 years 4 months ago
Voronoi-initializated island models for solving real-coded deceptive problems
Deceptive problems have always been considered difficult for Genetic Algorithms. To cope with this characteristic, the literature has proposed the use of Parallel Genetic Algorith...
Santiago Muelas, José Manuel Peña, V...
ISNN
2005
Springer
15 years 8 months ago
Feature Selection and Intrusion Detection Using Hybrid Flexible Neural Tree
Current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (if anything)...
Yuehui Chen, Ajith Abraham, Ju Yang
AAAI
2007
15 years 5 months ago
Gender-Sensitive Automated Negotiators
This paper introduces an innovative approach for automated negotiating using the gender of human opponents. Our approach segments the information acquired from previous opponents,...
Ron Katz, Sarit Kraus