Sciweavers

2006 search results - page 288 / 402
» Heuristic Security-Testing Methods
Sort
View
JCC
2008
166views more  JCC 2008»
15 years 21 days ago
Reference energy extremal optimization: A stochastic search algorithm applied to computational protein design
: We adapt a combinatorial optimization algorithm, extremal optimization (EO), for the search problem in computational protein design. This algorithm takes advantage of the knowled...
Naigong Zhang, Chen Zeng
89
Voted
INFFUS
2006
103views more  INFFUS 2006»
15 years 21 days ago
Information fusion approaches to the automatic pronunciation of print by analogy
Automatic pronunciation of words from their spelling alone is a hard computational problem, especially for languages like English and French where there is only a partially consis...
Robert I. Damper, Yannick Marchand
104
Voted
JCST
2008
138views more  JCST 2008»
15 years 21 days ago
Predicting Chinese Abbreviations from Definitions: An Empirical Learning Approach Using Support Vector Regression
In Chinese, phrases and named entities play a central role in information retrieval. Abbreviations, however, make keyword-based approaches less effective. This paper presents an em...
Xu Sun, Houfeng Wang, Bo Wang 0003
108
Voted
AAMAS
2002
Springer
15 years 18 days ago
Multiagent Learning for Open Systems: A Study in Opponent Classification
Abstract. Open systems are becoming increasingly important in a variety of distributed, networked computer applications. Their characteristics, such as agent diversity, heterogenei...
Michael Rovatsos, Gerhard Weiß, Marco Wolf
116
Voted
CSL
2004
Springer
15 years 17 days ago
Word sense disambiguation of WordNet glosses
This paper presents a suite of methods and results for the semantic disambiguation of WordNet glosses. WordNet is a resource widely used in natural language processing and artific...
Dan I. Moldovan, Adrian Novischi