In this paper, we evaluate the performance of ten well-known evolutionary and non-evolutionary rule learning algorithms. The comparative study is performed on a real-world classi...
M. Zubair Shafiq, S. Momina Tabish, Muddassar Faro...
Major computer companies and government agencies are adopting Web Services (WS) technology. Web services must ensure interoperability and security, and be reliable and trustworthy...
To anticipate and prevent acts of terrorism, Indications and Warnings analysts try to connect clues gleaned from massive quantities of complex data. Multi-agent approaches to supp...
Peter Weinstein, H. Van Dyke Parunak, Paul Chiusan...
The efficient simulation of multi-agent systems presents particular challenges which are not addressed by current parallel discrete event simulation (PDES) models and techniques. ...
Michael Lees, Brian Logan, Rob Minson, Ton Oguara,...
Reverberant speech can be described as sounding distant with noticeable coloration and echo. These detrimental perceptual effects are caused by early and late reflections, respec...
Emanuel A. P. Habets, Nikolay D. Gaubitch, Patrick...