Sciweavers

11121 search results - page 2190 / 2225
» Computing with Continuous Change
Sort
View
DIM
2008
ACM
15 years 2 months ago
Anti-phishing based on automated individual white-list
In phishing and pharming, users could be easily tricked into submitting their username/passwords into fraudulent web sites whose appearances look similar as the genuine ones. The ...
Ye Cao, Weili Han, Yueran Le
ICARIS
2010
Springer
15 years 2 months ago
Defining a Simulation Strategy for Cancer Immunocompetence
Although there are various types of cancer treatments, none of these currently take into account the effect of ageing of the immune system and hence altered responses to cancer. R...
Grazziela P. Figueredo, Uwe Aickelin
GECCO
2008
Springer
182views Optimization» more  GECCO 2008»
15 years 2 months ago
Scaling ant colony optimization with hierarchical reinforcement learning partitioning
This paper merges hierarchical reinforcement learning (HRL) with ant colony optimization (ACO) to produce a HRL ACO algorithm capable of generating solutions for large domains. Th...
Erik J. Dries, Gilbert L. Peterson
GECCO
2008
Springer
239views Optimization» more  GECCO 2008»
15 years 2 months ago
Multiobjective design of operators that detect points of interest in images
In this paper, a multiobjective (MO) learning approach to image feature extraction is described, where Pareto-optimal interest point (IP) detectors are synthesized using genetic p...
Leonardo Trujillo, Gustavo Olague, Evelyne Lutton,...
GECCO
2008
Springer
175views Optimization» more  GECCO 2008»
15 years 2 months ago
Using differential evolution for symbolic regression and numerical constant creation
One problem that has plagued Genetic Programming (GP) and its derivatives is numerical constant creation. Given a mathematical formula expressed as a tree structure, the leaf node...
Brian M. Cerny, Peter C. Nelson, Chi Zhou
« Prev « First page 2190 / 2225 Last » Next »