Sciweavers

2610 search results - page 441 / 522
» Computational Probabilistic Non-interference
Sort
View
119
Voted
CIARP
2007
Springer
15 years 6 months ago
Human Detection in Indoor Environments Using Multiple Visual Cues and a Mobile Robot
In order to deploy mobile robots in social environments like indoor buildings, they need to be provided with perceptual abilities to detect people. In the computer vision literatur...
Stefan Pszczólkowski, Alvaro Soto
97
Voted
GECCO
2007
Springer
210views Optimization» more  GECCO 2007»
15 years 6 months ago
An application of EDA and GA to dynamic pricing
E-commerce has transformed the way firms develop their pricing strategies, producing shift away from fixed pricing to dynamic pricing. In this paper, we use two different Estim...
Siddhartha Shakya, Fernando Oliveira, Gilbert Owus...
GECCO
2007
Springer
190views Optimization» more  GECCO 2007»
15 years 6 months ago
Analysis of evolutionary algorithms for the longest common subsequence problem
In the longest common subsequence problem the task is to find the longest sequence of letters that can be found as subsequence in all members of a given finite set of sequences....
Thomas Jansen, Dennis Weyland
82
Voted
GECCO
2007
Springer
163views Optimization» more  GECCO 2007»
15 years 6 months ago
Choice and development
The process of development creates a phenotype from one or more genotypes of an individual through interaction with an environment. The opportunity for development to choose a phe...
Arthur M. Farley
IH
2007
Springer
15 years 6 months ago
Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection
Abstract. We introduce software integrity checking expressions (SoftICEs), which are program predicates that can be used in software tamper detection. We present two candidates, pr...
Mariusz H. Jakubowski, Prasad Naldurg, Vijay Patan...