Sciweavers

8706 search results - page 1611 / 1742
» Learning Subjective Language
Sort
View
133
Voted
CISC
2005
Springer
109views Cryptology» more  CISC 2005»
15 years 9 months ago
Enforcing Email Addresses Privacy Using Tokens
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Roman Schlegel, Serge Vaudenay
137
Voted
DIGRA
2005
Springer
15 years 9 months ago
The Nip and the Bite
An examination of the contributions that can be made by the field of non-mechanistic cybernetics (as elaborated by Gregory Bateson and Anthony Wilden) to a theory of videogames th...
Darshana Jayemanne
132
Voted
GECCO
2005
Springer
112views Optimization» more  GECCO 2005»
15 years 9 months ago
Monotonic solution concepts in coevolution
Assume a coevolutionary algorithm capable of storing and utilizing all phenotypes discovered during its operation, for as long as it operates on a problem; that is, assume an algo...
Sevan G. Ficici
122
Voted
GECCO
2005
Springer
140views Optimization» more  GECCO 2005»
15 years 9 months ago
CGP visits the Santa Fe trail: effects of heuristics on GP
GP uses trees to represent chromosomes. The user defines the representation space by defining the set of functions and terminals to label the nodes in the trees, and GP searches t...
Cezary Z. Janikow, Christopher J. Mann
128
Voted
GECCO
2005
Springer
154views Optimization» more  GECCO 2005»
15 years 9 months ago
Combining competent crossover and mutation operators: a probabilistic model building approach
This paper presents an approach to combine competent crossover and mutation operators via probabilistic model building. Both operators are based on the probabilistic model buildin...
Cláudio F. Lima, Kumara Sastry, David E. Go...
« Prev « First page 1611 / 1742 Last » Next »