Sciweavers

738 search results - page 70 / 148
» Crossover can provably be useful in evolutionary computation
Sort
View
ISW
2004
Springer
15 years 3 months ago
Practical Authenticated Key Agreement Using Passwords
Due to the low entropy of human-memorable passwords, it is not easy to conduct password authenticated key agreement in a secure manner. Though there are many protocols achieving th...
Taekyoung Kwon
ACL
2011
14 years 1 months ago
Binarized Forest to String Translation
Tree-to-string translation is syntax-aware and efficient but sensitive to parsing errors. Forestto-string translation approaches mitigate the risk of propagating parser errors in...
Hao Zhang, Licheng Fang, Peng Xu, Xiaoyun Wu
SOCO
2010
Springer
14 years 4 months ago
Taximeter verification with GPS and soft computing techniques
Until recently, local governments in Spain were using machines with rolling cylinders for verifying taximeters. However, the condition of the tires can lead to errors in the proces...
José Villar, Adolfo Otero, José Oter...
GECCO
2010
Springer
127views Optimization» more  GECCO 2010»
14 years 8 months ago
Set-based multi-objective optimization, indicators, and deteriorative cycles
Evolutionary multi-objective optimization deals with the task of computing a minimal set of search points according to a given set of objective functions. The task has been made e...
Rudolf Berghammer, Tobias Friedrich, Frank Neumann
ECAL
2007
Springer
15 years 1 months ago
How Does Niche Construction Reverse the Baldwin Effect?
Deacon [1] considers that the reverse Baldwin effect can be one of the major forces in language evolution. The reverse Baldwin effect is essentially a redistributional process of g...
Hajime Yamauchi