Sciweavers

1623 search results - page 306 / 325
» No Sorting
Sort
View
94
Voted
BLISS
2009
IEEE
15 years 1 months ago
Mechatronic Security and Robot Authentication
Robot Security is becoming more and more a serious issue for many modern applications. Robot Security matters are still not intensively addressed in the published literature. The ...
Wael Adi
104
Voted
GECCO
2008
Springer
145views Optimization» more  GECCO 2008»
15 years 1 months ago
Memory with memory: soft assignment in genetic programming
Based in part on observations about the incremental nature of most state changes in biological systems, we introduce the idea of Memory with Memory in Genetic Programming (GP), wh...
Nicholas Freitag McPhee, Riccardo Poli
100
Voted
GECCO
2008
Springer
132views Optimization» more  GECCO 2008»
15 years 1 months ago
Hybridizing an evolutionary algorithm with mathematical programming techniques for multi-objective optimization
In recent years, the development of multi-objective evolutionary algorithms (MOEAs) hybridized with mathematical programming techniques has significantly increased. However, most...
Saúl Zapotecas Martínez, Carlos A. C...
100
Voted
ICML
2010
IEEE
15 years 1 months ago
On the Consistency of Ranking Algorithms
We present a theoretical analysis of supervised ranking, providing necessary and sufficient conditions for the asymptotic consistency of algorithms based on minimizing a surrogate...
John Duchi, Lester W. Mackey, Michael I. Jordan
ALMOB
2008
81views more  ALMOB 2008»
15 years 27 days ago
Stability of multiple alignments and phylogenetic trees: an analysis of ABC-transporter proteins family
Background: Sequence-based phylogeny reconstruction is a fundamental task in Bioinformatics. Practically all methods for phylogeny reconstruction are based on multiple alignments....
Holger Wagner, Burkhard Morgenstern, Andreas W. M....