Sciweavers

5290 search results - page 826 / 1058
» Knowledge Processing in Intelligent Systems
Sort
View
GECCO
2009
Springer
161views Optimization» more  GECCO 2009»
15 years 7 months ago
Are evolutionary rule learning algorithms appropriate for malware detection?
In this paper, we evaluate the performance of ten well-known evolutionary and non-evolutionary rule learning algorithms. The comparative study is performed on a real-world classi...
M. Zubair Shafiq, S. Momina Tabish, Muddassar Faro...
107
Voted
WORDS
2005
IEEE
15 years 6 months ago
Progressive Ranking and Composition of Web Services Using Covering Arrays
Major computer companies and government agencies are adopting Web Services (WS) technology. Web services must ensure interoperability and security, and be reliable and trustworthy...
Charles J. Colbourn, Yinong Chen, Wei-Tek Tsai
ATAL
2004
Springer
15 years 5 months ago
Agents Swarming in Semantic Spaces to Corroborate Hypotheses
To anticipate and prevent acts of terrorism, Indications and Warnings analysts try to connect clues gleaned from massive quantities of complex data. Multi-agent approaches to supp...
Peter Weinstein, H. Van Dyke Parunak, Paul Chiusan...
MABS
2004
Springer
15 years 5 months ago
Distributed Simulation of MAS
The efficient simulation of multi-agent systems presents particular challenges which are not addressed by current parallel discrete event simulation (PDES) models and techniques. ...
Michael Lees, Brian Logan, Rob Minson, Ton Oguara,...
ICASSP
2008
IEEE
15 years 7 months ago
Temporal selective dereverberation of noisy speech using one microphone
Reverberant speech can be described as sounding distant with noticeable coloration and echo. These detrimental perceptual effects are caused by early and late reflections, respec...
Emanuel A. P. Habets, Nikolay D. Gaubitch, Patrick...