Sciweavers

1997 search results - page 240 / 400
» On the convergence of Hill's method
Sort
View
CCS
2005
ACM
15 years 7 months ago
Deciding security of protocols against off-line guessing attacks
We provide an effective procedure for deciding the existence of off-line guessing attacks on security protocols, for a bounded number of sessions. The procedure consists of a co...
Mathieu Baudet
GECCO
2005
Springer
117views Optimization» more  GECCO 2005»
15 years 7 months ago
Directional self-learning of genetic algorithm
In order to overcome the low convergence speed and prematurity of classical genetic algorithm, an improved method named directional self-learning of genetic algorithm (DSLGA) is p...
Lin Cong, Yuheng Sha, Licheng Jiao, Fang Liu
GECCO
2005
Springer
207views Optimization» more  GECCO 2005»
15 years 7 months ago
Adaptive crossover and mutation in genetic algorithms based on clustering technique
Instead of having fixed px and pm, this paper presents the use of fuzzy logic to adaptively tune px and pm for optimization of power electronic circuits throughout the process. By...
Jun Zhang, Henry Shu-Hung Chung, Jinghui Zhong
ICIC
2005
Springer
15 years 7 months ago
Improvements to the Conventional Layer-by-Layer BP Algorithm
This paper points out some drawbacks and proposes some modifications to the conventional layer-by-layer BP algorithm. In particular, we present a new perspective to the learning ra...
Xu-Qin Li, Fei Han, Tat-Ming Lok, Michael R. Lyu, ...
ATAL
2004
Springer
15 years 7 months ago
Decentralized Language Learning through Acting
This paper presents an algorithm for learning the meaning of messages communicated between agents that interact while acting optimally towards a cooperative goal. Our reinforcemen...
Claudia V. Goldman, Martin Allen, Shlomo Zilberste...