Sciweavers

6087 search results - page 1165 / 1218
» Knowledge discovery methods
Sort
View
CIKM
2005
Springer
15 years 3 months ago
Query expansion using random walk models
It has long been recognized that capturing term relationships is an important aspect of information retrieval. Even with large amounts of data, we usually only have significant ev...
Kevyn Collins-Thompson, Jamie Callan
GECCO
2005
Springer
112views Optimization» more  GECCO 2005»
15 years 3 months ago
Monotonic solution concepts in coevolution
Assume a coevolutionary algorithm capable of storing and utilizing all phenotypes discovered during its operation, for as long as it operates on a problem; that is, assume an algo...
Sevan G. Ficici
GECCO
2005
Springer
154views Optimization» more  GECCO 2005»
15 years 3 months ago
Combining competent crossover and mutation operators: a probabilistic model building approach
This paper presents an approach to combine competent crossover and mutation operators via probabilistic model building. Both operators are based on the probabilistic model buildin...
Cláudio F. Lima, Kumara Sastry, David E. Go...
MMMACNS
2005
Springer
15 years 3 months ago
A Passive External Web Surveillance Technique for Private Networks
The variety and richness of what users browse on the Internet has made the communications of web-browsing hosts an attractive target for surveillance. We show that passive external...
Constantine Daicos, Scott Knight
PREMI
2005
Springer
15 years 3 months ago
Computational Molecular Biology of Genome Expression and Regulation
Abstract. Technological advances in experimental and computational molecular biology have revolutionized the whole fields of biology and medicine. Large-scale sequencing, expressio...
Michael Q. Zhang
« Prev « First page 1165 / 1218 Last » Next »