Sciweavers

1518 search results - page 218 / 304
» Cryptographic Test Correction
Sort
View
ADHOCNOW
2004
Springer
15 years 6 months ago
Improving Distance Based Geographic Location Techniques in Sensor Networks
Supporting nodes without Global Positioning System (GPS) capability, in wireless ad hoc and sensor networks, has numerous applications in guidance and surveying systems in use toda...
Michel Barbeau, Evangelos Kranakis, Danny Krizanc,...
118
Voted
EUROGP
2004
Springer
133views Optimization» more  EUROGP 2004»
15 years 6 months ago
Lymphoma Cancer Classification Using Genetic Programming with SNR Features
Lymphoma cancer classification with DNA microarray data is one of important problems in bioinformatics. Many machine learning techniques have been applied to the problem and produc...
Jin-Hyuk Hong, Sung-Bae Cho
FASE
2004
Springer
15 years 6 months ago
Checking Absence of Illicit Applet Interactions: A Case Study
Abstract. This paper presents the use of a method – and its corresponding tool set – for compositional verification of applet interactions on a realistic industrial smart card...
Marieke Huisman, Dilian Gurov, Christoph Sprenger,...
FSTTCS
2004
Springer
15 years 6 months ago
Learning Languages from Positive Data and a Finite Number of Queries
A computational model for learning languages in the limit from full positive data and a bounded number of queries to the teacher (oracle) is introduced and explored. Equivalence, ...
Sanjay Jain, Efim B. Kinber
104
Voted
GECCO
2004
Springer
116views Optimization» more  GECCO 2004»
15 years 6 months ago
Reducing Fitness Evaluations Using Clustering Techniques and Neural Network Ensembles
Abstract. In many real-world applications of evolutionary computation, it is essential to reduce the number of fitness evaluations. To this end, computationally efficient models c...
Yaochu Jin, Bernhard Sendhoff