Sciweavers

2924 search results - page 545 / 585
» On the Use of Evidence in Neural Networks
Sort
View
HAIS
2010
Springer
15 years 6 months ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...
GECCO
2009
Springer
124views Optimization» more  GECCO 2009»
15 years 6 months ago
Reinforcement learning for games: failures and successes
We apply CMA-ES, an evolution strategy with covariance matrix adaptation, and TDL (Temporal Difference Learning) to reinforcement learning tasks. In both cases these algorithms se...
Wolfgang Konen, Thomas Bartz-Beielstein
NLPRS
2001
Springer
15 years 6 months ago
Vietnamese Word Segmentation
Word segmentation is the first and obligatory task for every NLP. For inflectional languages like English, French, Dutch,.. their word boundaries are simply assumed to be whitespa...
Dinh Dien, Hoang Kiem, Nguyen Van Toan
ECAI
2000
Springer
15 years 5 months ago
Similarity-based Approach to Relevance Learning
In several information retrieval (IR) systems there is a possibility for user feedback. Many machine learning methods have been proposed that learn from the feedback information in...
Rickard Cöster, Lars Asker
ANTSW
2004
Springer
15 years 5 months ago
Cooperative Transport of Objects of Different Shapes and Sizes
This paper addresses the design of control policies for groups of up to 16 simple autonomous mobile robots (called s-bots) for the cooperative transport of heavy objects of differe...
Roderich Groß, Marco Dorigo