Sciweavers

1914 search results - page 173 / 383
» Evaluation of a Catalytic Search Algorithm
Sort
View
UIST
2010
ACM
14 years 8 months ago
Eddi: interactive topic-based browsing of social status streams
Twitter streams are on overload: active users receive hundreds of items per day, and existing interfaces force us to march through a chronologically-ordered morass to find tweets ...
Michael S. Bernstein, Bongwon Suh, Lichan Hong, Ji...
GECCO
2009
Springer
162views Optimization» more  GECCO 2009»
14 years 8 months ago
Uncertainty handling CMA-ES for reinforcement learning
The covariance matrix adaptation evolution strategy (CMAES) has proven to be a powerful method for reinforcement learning (RL). Recently, the CMA-ES has been augmented with an ada...
Verena Heidrich-Meisner, Christian Igel
WOSP
2010
ACM
14 years 10 months ago
Automatically improve software architecture models for performance, reliability, and cost using evolutionary algorithms
Quantitative prediction of quality properties (i.e. extrafunctional properties such as performance, reliability, and cost) of software architectures during design supports a syste...
Anne Martens, Heiko Koziolek, Steffen Becker, Ralf...
EDBT
2009
ACM
138views Database» more  EDBT 2009»
15 years 5 months ago
FOGGER: an algorithm for graph generator discovery
To our best knowledge, all existing graph pattern mining algorithms can only mine either closed, maximal or the complete set of frequent subgraphs instead of graph generators whic...
Zhiping Zeng, Jianyong Wang, Jun Zhang, Lizhu Zhou
INFOCOM
2008
IEEE
15 years 4 months ago
Firewall Compressor: An Algorithm for Minimizing Firewall Policies
—A firewall is a security guard placed between a private network and the outside Internet that monitors all incoming and outgoing packets. The function of a firewall is to exam...
Alex X. Liu, Eric Torng, Chad R. Meiners