Sciweavers

8080 search results - page 1487 / 1616
» From Computer Networks to Agent Networks
Sort
View
WEBI
2009
Springer
15 years 10 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
EPEW
2009
Springer
15 years 10 months ago
Performance of Auctions and Sealed Bids
We develop models of automated E-commerce techniques, which predict the economic outcomes of these decision mechanisms, including the price attained by a good and the resulting inc...
Erol Gelenbe, László Györfi
GECCO
2009
Springer
135views Optimization» more  GECCO 2009»
15 years 10 months ago
Neuroevolutionary reinforcement learning for generalized helicopter control
Helicopter hovering is an important challenge problem in the field of reinforcement learning. This paper considers several neuroevolutionary approaches to discovering robust cont...
Rogier Koppejan, Shimon Whiteson
ICANN
2009
Springer
15 years 10 months ago
Multimodal Sparse Features for Object Detection
In this paper the sparse coding principle is employed for the representation of multimodal image data, i.e. image intensity and range. We estimate an image basis for frontal face i...
Martin Haker, Thomas Martinetz, Erhardt Barth
IWSEC
2009
Springer
15 years 10 months ago
Impossible Boomerang Attack for Block Cipher Structures
Impossible boomerang attack [5] (IBA) is a new variant of differential cryptanalysis against block ciphers. Evident from its name, it combines the ideas of both impossible differ...
Jiali Choy, Huihui Yap
« Prev « First page 1487 / 1616 Last » Next »