Sciweavers

6393 search results - page 936 / 1279
» Randomized Algorithms on the Mesh
Sort
View
154
Voted
ATAL
2004
Springer
15 years 10 months ago
Effectiveness of Query Types and Policies for Preference Elicitation in Combinatorial Auctions
Combinatorial auctions, where agents can bid on bundles of items (resources, tasks, etc.), are desirable because the agents can express complementarity and substitutability among ...
Benoît Hudson, Tuomas Sandholm
158
Voted
GECCO
2004
Springer
100views Optimization» more  GECCO 2004»
15 years 10 months ago
Analysis of the (1+1) EA for a Noisy OneMax
Abstract. In practical applications evaluating a fitness function is frequently subject to noise, i. e., the “true fitness” is disturbed by some random variations. Evolutiona...
Stefan Droste
IWDW
2004
Springer
15 years 10 months ago
A Multi-feature Based Invertible Authentication Watermarking for JPEG Images
: Invertible authentication techniques have been used in some special applications (such as medical or military) where original data can be recovered after authenticated. In this p...
Deng-Pan Ye, Yaobin Mao, Yuewei Dai, Zhiquan Wang
158
Voted
PPSN
2004
Springer
15 years 10 months ago
Phase Transition Properties of Clustered Travelling Salesman Problem Instances Generated with Evolutionary Computation
Abstract. This paper introduces a generator that creates problem instances for the Euclidean symmetric travelling salesman problem. To fit real world problems, we look at maps con...
Jano I. van Hemert, Neil Urquhart
ICDM
2003
IEEE
143views Data Mining» more  ICDM 2003»
15 years 10 months ago
Active Sampling for Feature Selection
In knowledge discovery applications, where new features are to be added, an acquisition policy can help select the features to be acquired based on their relevance and the cost of...
Sriharsha Veeramachaneni, Paolo Avesani