Sciweavers

6087 search results - page 1011 / 1218
» Knowledge discovery methods
Sort
View
FC
2005
Springer
110views Cryptology» more  FC 2005»
15 years 10 months ago
A Privacy-Protecting Coupon System
A coupon represents the right to claim some service which is typically offered by vendors. In practice, issuing bundled multi-coupons is more efficient than issuing single coupons...
Liqun Chen, Matthias Enzmann, Ahmad-Reza Sadeghi, ...
127
Voted
GECCO
2005
Springer
142views Optimization» more  GECCO 2005»
15 years 10 months ago
Toward evolved flight
We present the first hardware-in-the-loop evolutionary optimization on an ornithopter. Our experiments demonstrate the feasibility of evolving flight through genetic algorithms an...
Rusty Hunt, Gregory Hornby, Jason D. Lohn
144
Voted
GECCO
2005
Springer
162views Optimization» more  GECCO 2005»
15 years 10 months ago
An autonomous explore/exploit strategy
In reinforcement learning problems it has been considered that neither exploitation nor exploration can be pursued exclusively without failing at the task. The optimal balance bet...
Alex McMahon, Dan Scott, William N. L. Browne
113
Voted
ICANN
2005
Springer
15 years 10 months ago
Evolution of Heuristics for Give-Away Checkers
The efficacy of two evolutionary approaches to the problem of generation of heuristical linear and non-linear evaluation functions in the game of give-away checkers is tested in th...
Magdalena Kusiak, Karol Waledzik, Jacek Mandziuk
IMA
2005
Springer
126views Cryptology» more  IMA 2005»
15 years 10 months ago
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
Abstract. Identity-based encryption (IBE) is a special asymmetric encryption method where a public encryption key can be an arbitrary identifier and the corresponding private decr...
Liqun Chen, Zhaohui Cheng
« Prev « First page 1011 / 1218 Last » Next »