Sciweavers

11436 search results - page 1894 / 2288
» Modeling Real Reasoning
Sort
View
CEC
2010
IEEE
15 years 6 months ago
Improving GP classification performance by injection of decision trees
This paper presents a novel hybrid method combining genetic programming and decision tree learning. The method starts by estimating a benchmark level of reasonable accuracy, based ...
Rikard König, Ulf Johansson, Tuve Löfstr...
151
Voted
DBSEC
2009
122views Database» more  DBSEC 2009»
15 years 6 months ago
An Approach to Security Policy Configuration Using Semantic Threat Graphs
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding a...
Simon N. Foley, William M. Fitzgerald
159
Voted
GECCO
2008
Springer
137views Optimization» more  GECCO 2008»
15 years 6 months ago
Rank based variation operators for genetic algorithms
We show how and why using genetic operators that are applied with probabilities that depend on the fitness rank of a genotype or phenotype offers a robust alternative to the Sim...
Jorge Cervantes, Christopher R. Stephens
159
Voted
GISCIENCE
2008
Springer
130views GIS» more  GISCIENCE 2008»
15 years 6 months ago
Single-Holed Regions: Their Relations and Inferences
The discontinuities in boundaries and exteriors that regions with holes expose offer opportunities for inferences that are impossible for regions without holes. A systematic study ...
Maria Vasardani, Max J. Egenhofer
CAISE
2010
Springer
15 years 5 months ago
Dynamic Authorisation Policies for Event-Based Task Delegation
Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are tw...
Khaled Gaaloul, Ehtesham Zahoor, François C...
« Prev « First page 1894 / 2288 Last » Next »