Sciweavers

7342 search results - page 1144 / 1469
» Optimal Language Learning
Sort
View
GECCO
2004
Springer
121views Optimization» more  GECCO 2004»
15 years 9 months ago
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the des...
Gerry V. Dozier, Douglas Brown, John Hurley, Kryst...
145
Voted
XPU
2004
Springer
15 years 9 months ago
Self-Adaptability of Agile Software Processes: A Case Study on Post-iteration Workshops
None of the agile methods are claimed to fit all development situations. A team should attempt to adapt the methods and practices to fit their specific needs. For that reason agile...
Outi Salo, Kari Kolehmainen, Pekka Kyllönen, ...
IPPS
2003
IEEE
15 years 9 months ago
SPMD Image Processing on Beowulf Clusters: Directives and Libraries
Most image processing algorithms can be parallelized by splitting parallel loops and by using very few communication patterns. Code parallelization using MPI still involves much p...
Paulo F. Oliveira, J. M. Hans du Buf
163
Voted
STACS
2010
Springer
15 years 9 months ago
A Dichotomy Theorem for the General Minimum Cost Homomorphism Problem
Abstract. In the constraint satisfaction problem (CSP), the aim is to find an assignment of values to a set of variables subject to specified constraints. In the minimum cost hom...
Rustem Takhanov
GECCO
2010
Springer
151views Optimization» more  GECCO 2010»
15 years 9 months ago
Sustaining behavioral diversity in NEAT
Niching schemes, which sustain population diversity and let an evolutionary population avoid premature convergence, have been extensively studied in the research field of evoluti...
Hirotaka Moriguchi, Shinichi Honiden
« Prev « First page 1144 / 1469 Last » Next »