Sciweavers

5948 search results - page 1031 / 1190
» Computing Robust Counter-Strategies
Sort
View
120
Voted
ANTSW
2004
Springer
15 years 9 months ago
An Ant Approach to Membership Overlay Design
Designing an optimal overlay communication network for a set of processes on the Internet is a central problem of peer-to-peer (P2P) computing. Such a network defines membership a...
Vittorio Maniezzo, Marco A. Boschetti, Márk...
ATAL
2004
Springer
15 years 9 months ago
Framework to Control Emergent Survivability of Multi Agent Systems
As the science of multi-agent systems matures, many developers are looking to deploy mission critical applications on distributed multi-agent systems (DMAS). Due to their distribu...
Aaron Helsinger, Karl Kleinmann, Marshall Brinn
110
Voted
GECCO
2004
Springer
113views Optimization» more  GECCO 2004»
15 years 9 months ago
Implications of Epigenetic Learning Via Modification of Histones on Performance of Genetic Programming
Extending the notion of inheritable genotype in genetic programming (GP) from the common model of DNA into chromatin (DNA and histones), we propose an approach of embedding in GP a...
Ivan Tanev, Kikuo Yuta
116
Voted
IH
2004
Springer
15 years 9 months ago
Information Hiding in Finite State Machine
In this paper, we consider how to hide information into finite state machine (FSM), one of the popular computation models. The key advantage of hiding information in FSM is that t...
Lin Yuan, Gang Qu
150
Voted
IJCNLP
2004
Springer
15 years 9 months ago
Window-Based Method for Information Retrieval
In this paper, a series of window-based methods is proposed for information retrieval. Compared with traditional tf-idf model, our approaches are based on two new key notions. The ...
Qianli Jin, Jun Zhao, Bo Xu
« Prev « First page 1031 / 1190 Last » Next »