Sciweavers

1650 search results - page 290 / 330
» How to Turn the Page
Sort
View
ACISP
2009
Springer
15 years 4 months ago
Towards Denial-of-Service-Resilient Key Agreement Protocols
Denial of service resilience is an important practical consideration for key agreement protocols in any hostile environment such as the Internet. There are well-known models that ...
Douglas Stebila, Berkant Ustaoglu
WINE
2009
Springer
199views Economy» more  WINE 2009»
15 years 4 months ago
Externalities in Keyword Auctions: An Empirical and Theoretical Assessment
It is widely believed that the value of acquiring a slot in a sponsored search list (that comes along with the organic links in a search engine’s result page) highly depends on ...
Renato Gomes, Nicole Immorlica, Evangelos Markakis
99
Voted
GECCO
2009
Springer
109views Optimization» more  GECCO 2009»
15 years 4 months ago
Canonical representation genetic programming
Search spaces sampled by the process of Genetic Programming often consist of programs which can represent a function in many different ways. Thus, when the space is examined it i...
John R. Woodward, Ruibin Bai
GECCO
2009
Springer
156views Optimization» more  GECCO 2009»
15 years 4 months ago
Articulating user preferences in many-objective problems by sampling the weighted hypervolume
The hypervolume indicator has become popular in recent years both for performance assessment and to guide the search of evolutionary multiobjective optimizers. Two critical resear...
Anne Auger, Johannes Bader, Dimo Brockhoff, Eckart...
GECCO
2009
Springer
151views Optimization» more  GECCO 2009»
15 years 4 months ago
Evolution of functional specialization in a morphologically homogeneous robot
A central tenet of embodied artificial intelligence is that intelligent behavior arises out of the coupled dynamics between an agent’s body, brain and environment. It follows t...
Joshua S. Auerbach, Josh C. Bongard