Sciweavers

2006 search results - page 374 / 402
» Heuristic Security-Testing Methods
Sort
View
ATAL
2010
Springer
15 years 1 months ago
Deception in networks of mobile sensing agents
Recent studies have investigated how a team of mobile sensors can cope with real world constraints, such as uncertainty in the reward functions, dynamically appearing and disappea...
Viliam Lisý, Roie Zivan, Katia P. Sycara, M...
110
Voted
GECCO
2008
Springer
152views Optimization» more  GECCO 2008»
15 years 1 months ago
Combatting financial fraud: a coevolutionary anomaly detection approach
A major difficulty for anomaly detection lies in discovering boundaries between normal and anomalous behavior, due to the deficiency of abnormal samples in the training phase. In...
Shelly Xiaonan Wu, Wolfgang Banzhaf
97
Voted
ICML
2010
IEEE
15 years 1 months ago
Large Scale Max-Margin Multi-Label Classification with Priors
We propose a max-margin formulation for the multi-label classification problem where the goal is to tag a data point with a set of pre-specified labels. Given a set of L labels, a...
Bharath Hariharan, Lihi Zelnik-Manor, S. V. N. Vis...
136
Voted
GECCO
2010
Springer
244views Optimization» more  GECCO 2010»
15 years 20 days ago
Implicit fitness and heterogeneous preferences in the genetic algorithm
This paper takes an economic approach to derive an evolutionary learning model based entirely on the endogenous employment of genetic operators in the service of self-interested a...
Justin T. H. Smith
103
Voted
ALMOB
2008
82views more  ALMOB 2008»
15 years 18 days ago
Protein sequence and structure alignments within one framework
Background: Protein structure alignments are usually based on very different techniques to sequence alignments. We propose a method which treats sequence, structure and even combi...
Gundolf Schenk, Thomas Margraf, Andrew E. Torda