Sciweavers

329 search results - page 62 / 66
» Computational intelligence algorithms for risk-adjusted trad...
Sort
View
WWW
2010
ACM
15 years 4 months ago
Shout out: integrating news and reader comments
A useful approach for enabling computers to automatically create new content is utilizing the text, media, and information already present on the World Wide Web. The newly created...
Lisa M. Gandy, Nathan D. Nichols, Kristian J. Hamm...
CCS
2009
ACM
15 years 4 months ago
Active learning for network intrusion detection
Anomaly detection for network intrusion detection is usually considered an unsupervised task. Prominent techniques, such as one-class support vector machines, learn a hypersphere ...
Nico Görnitz, Marius Kloft, Konrad Rieck, Ulf...
MOBIWAC
2006
ACM
15 years 3 months ago
Sink mobility protocols for data collection in wireless sensor networks
In wireless sensor networks data propagation is usually performed by sensors transmitting data towards a static control center (sink). Inspired by important applications (mostly r...
Ioannis Chatzigiannakis, Athanasios Kinalis, Sotir...
RTSS
2003
IEEE
15 years 2 months ago
Addressing Timeliness/Accuracy/Cost Tradeoffs in Information Collection for Dynamic Environments
In this paper, we focus on addressing the tradeoffs between timeliness, accuracy and cost for applications requiring real-time information collection in distributed real-time envi...
Qi Han, Nalini Venkatasubramanian
GECCO
2006
Springer
151views Optimization» more  GECCO 2006»
15 years 1 months ago
Neighbourhood searches for the bounded diameter minimum spanning tree problem embedded in a VNS, EA, and ACO
We consider the Bounded Diameter Minimum Spanning Tree problem and describe four neighbourhood searches for it. They are used as local improvement strategies within a variable nei...
Martin Gruber, Jano I. van Hemert, Günther R....