Sciweavers

7928 search results - page 1562 / 1586
» Human-Like Learning Methods for a
Sort
View
CISC
2005
Springer
109views Cryptology» more  CISC 2005»
15 years 10 months ago
Enforcing Email Addresses Privacy Using Tokens
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Roman Schlegel, Serge Vaudenay
GECCO
2005
Springer
112views Optimization» more  GECCO 2005»
15 years 10 months ago
Monotonic solution concepts in coevolution
Assume a coevolutionary algorithm capable of storing and utilizing all phenotypes discovered during its operation, for as long as it operates on a problem; that is, assume an algo...
Sevan G. Ficici
GECCO
2005
Springer
140views Optimization» more  GECCO 2005»
15 years 10 months ago
CGP visits the Santa Fe trail: effects of heuristics on GP
GP uses trees to represent chromosomes. The user defines the representation space by defining the set of functions and terminals to label the nodes in the trees, and GP searches t...
Cezary Z. Janikow, Christopher J. Mann
GECCO
2005
Springer
154views Optimization» more  GECCO 2005»
15 years 10 months ago
Combining competent crossover and mutation operators: a probabilistic model building approach
This paper presents an approach to combine competent crossover and mutation operators via probabilistic model building. Both operators are based on the probabilistic model buildin...
Cláudio F. Lima, Kumara Sastry, David E. Go...
ICMI
2005
Springer
140views Biometrics» more  ICMI 2005»
15 years 10 months ago
An initial usability assessment for symbolic haptic rendering of music parameters
Current methods of playlist creation and maintenance do not support user needs, especially in a mobile context. Furthermore, they do not scale: studies show that users with large ...
Meghan Allen, Jennifer Gluck, Karon E. MacLean, Er...
« Prev « First page 1562 / 1586 Last » Next »