Sciweavers

5090 search results - page 878 / 1018
» Constructing Strategies for Programming
Sort
View
CP
2007
Springer
15 years 10 months ago
A Compression Algorithm for Large Arity Extensional Constraints
We present an algorithm for compressing table constraints representing allowed or disallowed tuples. This type of constraint is used for example in configuration problems, where t...
George Katsirelos, Toby Walsh
GECCO
2007
Springer
151views Optimization» more  GECCO 2007»
15 years 10 months ago
Dynamical blueprints: exploiting levels of system-environment interaction
Developmental systems typically produce a phenotype through a generative process whose outcome depends on feedback from the environment. In most artificial developmental systems, ...
Nicolás S. Estévez, Hod Lipson
218
Voted
ILP
2007
Springer
15 years 10 months ago
Building Relational World Models for Reinforcement Learning
Abstract. Many reinforcement learning domains are highly relational. While traditional temporal-difference methods can be applied to these domains, they are limited in their capaci...
Trevor Walker, Lisa Torrey, Jude W. Shavlik, Richa...
MODELS
2007
Springer
15 years 10 months ago
11th International Workshop on Aspect-Oriented Modeling
This report summarizes the results and discussions from the 11th Workshop on Aspect-Oriented Modeling (AOM). The workshop was held in conjunction with the International Conference ...
Jörg Kienzle, Jeff Gray, Dominik Stein, Walte...
RAID
2007
Springer
15 years 10 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...