Sciweavers

5608 search results - page 1091 / 1122
» On the Theory of Matchgate Computations
Sort
View
GECCO
2010
Springer
155views Optimization» more  GECCO 2010»
15 years 6 months ago
Negative selection algorithms without generating detectors
Negative selection algorithms are immune-inspired classifiers that are trained on negative examples only. Classification is performed by generating detectors that match none of ...
Maciej Liskiewicz, Johannes Textor
SACMAT
2009
ACM
15 years 6 months ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
DESRIST
2009
Springer
79views Education» more  DESRIST 2009»
15 years 6 months ago
Power of peripheral designers: how users learn to design
In information system development, end-users often participate in design and in many cases learn to design their own system. Design, however, requires a distinct approach that use...
Yutaka Yamauchi
GECCO
2009
Springer
258views Optimization» more  GECCO 2009»
15 years 6 months ago
Evolutionary learning of local descriptor operators for object recognition
Nowadays, object recognition is widely studied under the paradigm of matching local features. This work describes a genetic programming methodology that synthesizes mathematical e...
Cynthia B. Pérez, Gustavo Olague
KDD
2009
ACM
379views Data Mining» more  KDD 2009»
15 years 6 months ago
MetaFac: community discovery via relational hypergraph factorization
This paper aims at discovering community structure in rich media social networks, through analysis of time-varying, multi-relational data. Community structure represents the laten...
Yu-Ru Lin, Jimeng Sun, Paul Castro, Ravi B. Konuru...
« Prev « First page 1091 / 1122 Last » Next »