Sciweavers

434 search results - page 82 / 87
» Coupled human and natural systems: A multi-agent-based appro...
Sort
View
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
15 years 1 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
BMCBI
2007
114views more  BMCBI 2007»
14 years 9 months ago
Mining and state-space modeling and verification of sub-networks from large-scale biomolecular networks
Background: Biomolecular networks dynamically respond to stimuli and implement cellular function. Understanding these dynamic changes is the key challenge for cell biologists. As ...
Xiaohua Hu, Fang-Xiang Wu
CORR
2004
Springer
180views Education» more  CORR 2004»
14 years 9 months ago
Self-Organized Stigmergic Document Maps: Environment as a Mechanism for Context Learning
Social insect societies and more specifically ant colonies, are distributed systems that, in spite of the simplicity of their individuals, present a highly structured social organi...
Vitorino Ramos, Juan J. Merelo Guervós
GECCO
2004
Springer
137views Optimization» more  GECCO 2004»
15 years 3 months ago
Achieving Shorter Search Times in Voice Conversion Using Interactive Evolution
We have already proposed using evolutionary computation to adjust the voice quality conversion parameters, and we have reported that this approach produces results that are not onl...
Yuji Sato
GECCO
2009
Springer
258views Optimization» more  GECCO 2009»
15 years 2 months ago
Evolutionary learning of local descriptor operators for object recognition
Nowadays, object recognition is widely studied under the paradigm of matching local features. This work describes a genetic programming methodology that synthesizes mathematical e...
Cynthia B. Pérez, Gustavo Olague